CIS 312 Success Begins / snaptutorial.com

Page 13

Two-way firewalls provide protection against unauthorized ______ and ______ traffic. •

Question 17

Social engineering is composed of a variety of methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering? •

Question 18

Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.) •

Question 19

Which of the following wireless encryption standards uses AES encryption? •

Question 20

A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network.

********************************************************


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.