ANSWERS ALREADY GRADED A++
A ____ is usually the best approach to security project
implementation. - ANSWER-phased implementation
A ____ system is designed to work in areas where electrical
equipment is used. Instead of containing water, the system
contains pressurized air. - ANSWER-dry-pipe
A __________ is a key-dependent, one-way hash function that allows
only specific recipients (symmetric key holders) to access the
message digest. - ANSWER-MAC
A __________ is the information used in conjunction with an
algorithm to create the ciphertext from the plaintext or derive the
plaintext from the ciphertext. - ANSWER-key
A __________ is the recorded condition of a particular revision of a
software or hardware configuration item. - ANSWER-version
A __________ vulnerability scanner listens in on the network and
identifies vulnerable versions of both server and client software. -
ANSWER-passive
A device that assures the delivery of electric power without
interruption is a(n) ____. - ANSWER-UPS
, A method of encryption that requires the same secret key to
encipher and decipher the message is known as __________
encryption. - ANSWER-symmetric
A primary mailing list for new vulnerabilities, called simply
__________, provides time-sensitive coverage of emerging
vulnerabilities, documenting how they are exploited and reporting
on how to remediate them. Individuals can register for the flagship
mailing list or any one of the entire family of its mailing lists. -
ANSWER-Bugtraq
A process called __________ examines the traffic that flows through
a system and its associated devices to identify the most frequently
used devices. - ANSWER-traffic analysis
A step commonly used for Internet vulnerability assessment
includes __________, which occurs when the penetration test engine
is unleashed at the scheduled time using the planned target list
and test selection. - ANSWER-Scanning
A(n) __________ IDPS is focused on protecting network information
assets. - ANSWER-network-based
A(n) __________ is a software program or hardware appliance that
can intercept, copy, and interpret network traffic. -
ANSWER-packet sniffer