Quiz Complete, well Done!
Intrusion
systems are used to identify and respond to suspicious network activities.
A
is a type of malicious software that can spread across a network.
Which of the following is NOT an example of network protection software?
Which of the following is not a type of malware?
Firewall
What is the main purpose of a firewall?
Phishing is a technique used by hackers to
sensitive information.
Two-factor
provides an extra layer of security for network login.
What is network backup and recovery?
Antivirus Software
network security audit
What is network monitoring?
Which of the following is NOT a type of Intrusion Detection System?
Two-factor authentication
What is the purpose of network backup and recovery?
The purpose of an incident response plan is to minimize
and reduce the recovery time and costs associated with a cyber attack.
Security policy
Network protection should include regular
to prevent data loss in case of disaster.
Antivirus
What is the purpose of an IDS?