Data Mining MCQ

1. If an ips identifies an attack, it can ________.

Answer

Correct Answer: Both drop the attack packet(s) and limit suspicious traffic to a certain percentage of the total bandwidth

Note: This Question is unanswered, help us to find answer for this one

2. Nearly all main border walls today use ________ filtering.

Answer

Correct Answer: Stateful Packet Inspection

Note: This Question is unanswered, help us to find answer for this one

3. Nat is able to stop ________.

Answer

Correct Answer: Both drop the attack packet and limit suspicious traffic to a certain percentage of the total bandwidth.

Note: This Question is unanswered, help us to find answer for this one

4. A(n) ________ is a security weakness that makes a program vulnerable to attack.

Answer

Correct Answer: Vulnerability.

Note: This Question is unanswered, help us to find answer for this one

5. Static packet filtering is sometimes used ________.

Answer

Correct Answer: Both as secondary filtering mechanism on an application proxy firewall and on border routers

Note: This Question is unanswered, help us to find answer for this one