Topic
Network and Infrastructure Security
Any malicious action that can damage or steal data is called a "Threat".
True
False
CIA stands for?
Compliance-Integral-Access
Confidentiality-Integrity-Authenticity
Confidentiality-Integrity-Availability
Confidentiality-Integrity-Accountability
Which of the following is not a specialized network security device or solution?
Firewall
IDS
VPN
Router
Select the best explanation for DMZ
To create a security zone for VPN terminations
To separate a security zone for an IPS and IDS server
To create a security zone that allows private traffic but is isolated from the public network
To create a security zone that allows public traffic but is isolated from the private network
Private IP Address are exposed to the internet
True
False