To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
asymmetrical
symmetrical
2. Which of the following steps can be implemented to prevent virus attacks?
Choose more than one option.
Prevent unauthorized users accessing the Internet
Use access control
Use software packages to immunize your system
Use virus scanners to search for viruses each time you boot up
3. Which of the following is a collection of components that acts as a barrier between a private network and the outside world?
Choose an option.
Encrypted tunnel
Firewall
Virtual Private Network (VPN) Virus
4. When you receive a message encrypted by the sender's private key, you decrypt it using the sender's public key.
Choose an option below to fill in the blank.
private
public
5. IDS systems work by calculating baselines for each of the parameters monitored. Your system is said to be operating normally when the parameter values recorded are within the baselines.
Choose an option below to fill in the blank.
outside
within
6. Which of the following are common user authentication systems?
Choose more than one option.
Biometrics
Digital signatures Passwords
Personal tokens