A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).
WTLSCorrect
A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet
VPNCorrect
As a philosophy, it complements midpoint security, which focuses on individual devices; preventive security instead focuses on how those devices interact, and on the connective tissue between them.
FalseCorrect
Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.
Data Loss PreventionCorrect
If the network isn't a line or a point: it's a _____________.
territoryCorrect
If there's one common theme among security experts, it's that relying on one single line of defense is dangerous, because any single defensive tool can be defeated by a determined adversary.
defense in depth strategyCorrect
It could be exploited because of an encryption key that was vulnerable to decoding.
WEP 64Correct
It disguises as useful software.
trojan horseCorrect
It helps keep data and equipment safe by giving only the appropriate people access.
network securityCorrect
It helps prevent attackers from monitoring or recording traffic between resources and computers.
data encryptionCorrect
It is a self-replicating program that is harmful to networks.
wormCorrect
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
LEAPCorrect
It uses available resources, such as passwords or scripts.
unstructured attacksCorrect
It uses code to access operating systems and software.
structured attacksCorrect
It was the first generation security standard for wireless network.
WEPCorrect
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.
TrueCorrect
Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access
TrueCorrect
One example is when an employee intends to cause damage.
malicious threatsCorrect
Preventive security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.
FalseCorrect
Software designed to detect, disable, and remove viruses, worms, and Trojans.
antivirusCorrect
Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.
FalseCorrect
These are created with malicious intent and sent by attackers.
virusCorrect
These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
data security attacksCorrect
This is a networking infrastructure company.
CISCOCorrect
This is a way of protecting a computer from intrusion through the ports.
firewallCorrect
This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.
WEP 128Correct
This is an improved version of WEP.
WPACorrect
This is data being transported on a network.
trafficCorrect
This is when the user damages data or equipment unintentionally.
accidental threatsCorrect
This refers to the events or attacks that steal, damage, or destroy equipment.