A(n) ________, also called a circuit-level gateway, evaluates not only a packet's source and destination addresses, but also the circuits that have been established for the packet's communication.
A) application firewall fence
B) digital recovery plan
C) stateful packet inspection
D) circuit filtering firewall
Answer: D) circuit filtering firewall
Learn More :
Securing the enterprise
- Of the various forms of standardized RAIDs, which two are the most commonly implemented?
- At a minimum, RAID 3 requires ________ drive(s).
- Unlike RAID 1, which has no automated error correcting mechanism, RAID ________ uses parity for data recovery.
- ECC stands for ________.
- Unlike a mirrored RAID 1, a ________ RAID 1 has separate hard drive controllers for each hard drive.
- _______ uses data stripping at the byte level, but with the addition of parity checking.
- In a mirrored RAID 1, a single hard drive controller is used to manage ________ hard drive(s).
- ____ can be implemented with disk mirroring or disk duplexing.
- A ________ is preferred for large data records because multiple drives can be read in parallel if a large record spans more than one drive.
- Simple disk stripping usually uses block-level stripping but can also be configured for ________-level stripping.
- RAID Level ________ is referred to as simple disk stripping.
- The six standardized RAID levels are ________.
- For an added expense, RAID drive arrays can support ________ drives.
- SCSI stands for ________.
- RAID is also sometimes referred to as ________.
- RAID stands for ________.
- An integrated security system should incorporate preventive, detective, and ________ measures that are internal and external to the enterprise.
- In order for a Disaster Recovery Plan to work, some degree of ________ is required.
- A network is both ________ and ________ vulnerable.
- Which of the following is NOT one of the four types of filtering that a firewall can perform?
- A successful cipher must make it difficult for an encrypted message to be viewed in its ________ form, without the use of the cryptographic key.
- ______ is the science of ensuring that data and information cannot be easily understood or modified by unauthorized individuals.
- Which of the following is NOT one of the CAIN components?
- A(n) ________ is an alternative facility where an organization can restore all or a portion of its business-critical systems within a short amount of time.
- DRP stands for ________.