1.
What type(s) of firewalls provide(s) the greatest degree of protection and control because both firewall technologies inspect all seven OSI layers of network traffic?
2.
Which of the following can degrade network performance?
3.
Which of the following provide(s) near-immediate recoverability for time-sensitive systems and transaction processing?
4.
What is an effective control for granting temporary access to vendors and external support personnel?
5.
Which of the following help(s) prevent an organization's systems from participating in a distributed denial-of-service (DDoS) attack?
6.
What is a common vulnerability, allowing denial-of-service attacks?
7.
What are trojan horse programs?
8.
What is/are used to measure and ensure proper network capacity management and availability of services?
9.
What can be used to gather evidence of network attacks?
10.
Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?