I have tried to get this right an I am still gettting this wrong... I will paste
ID: 3554987 • Letter: I
Question
I have tried to get this right an I am still gettting this wrong... I will paste what I have and will you please help me place the right term with the diffinition. She made this up and the definitions do not match the book. Please help.
I got 5 right out of nine and only a few are right.. Please re-do this for me... I want to pass my compTIA+
Match each item with a statement below:
The host that runs the proxy service.
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Software that can react to suspicious activity.
A firewall that protects only the computer on which it is installed.
Data is encrypted using a single key.
Data is encrypted using two keys.
Software that can only detect and log suspicious activity.
A firewall that can view a data stream.
A firewall that can block designated types of traffic based on application data contained within packets.
IPS
IDS
content filtering
HIDS
stateful
proxy server
proxy service
public key encryption
private key encryption
__7__The host that runs the proxy service.
__6__A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
__1__Software that can react to suspicious activity.
__2__A firewall that protects only the computer on which it is installed.
__9__Data is encrypted using a single key.
__8__Data is encrypted using two keys.
__4__Software that can only detect and log suspicious activity.
__5__A firewall that can view a data stream.
__3__A firewall that can block designated types of traffic based on application data contained within packets.
1.IPS
2.IDS
3.content filtering
4.HIDS
5.stateful
6.proxy server
7.proxy service
8.public key encryption
9.private key encryption
Explanation / Answer
The host that runs the proxy service.
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Software that can react to suspicious activity.
A firewall that protects only the computer on which it is installed.
Data is encrypted using a single key.
Data is encrypted using two keys.
Software that can only detect and log suspicious activity.
A firewall that can view a data stream.
A firewall that can block designated types of traffic based on application data contained within packets.
__6__The host that runs the proxy service.
__7__A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
__2__Software that can react to suspicious activity.
__4__A firewall that protects only the computer on which it is installed.
__9__Data is encrypted using a single key.
__8__Data is encrypted using two keys.
__1__Software that can only detect and log suspicious activity.
__5__A firewall that can view a data stream.
__3__A firewall that can block designated types of traffic based on application data contained within packets.