Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I have tried to get this right an I am still gettting this wrong... I will paste

ID: 3554987 • Letter: I

Question

I have tried to get this right an I am still gettting this wrong... I will paste what I have and will you please help me place the right term with the diffinition. She made this up and the definitions do not match the book. Please help.

I got 5 right out of nine and only a few are right.. Please re-do this for me... I want to pass my compTIA+

Match each item with a statement below:

The host that runs the proxy service.

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

Software that can react to suspicious activity.

A firewall that protects only the computer on which it is installed.

Data is encrypted using a single key.

Data is encrypted using two keys.

Software that can only detect and log suspicious activity.

A firewall that can view a data stream.

A firewall that can block designated types of traffic based on application data contained within packets.

IPS

IDS

content filtering

HIDS

stateful

proxy server

proxy service

public key encryption

private key encryption

__7__

The host that runs the proxy service.

__6__

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

__1__

Software that can react to suspicious activity.

__2__

A firewall that protects only the computer on which it is installed.

__9__

Data is encrypted using a single key.

__8__

Data is encrypted using two keys.

__4__

Software that can only detect and log suspicious activity.

__5__

A firewall that can view a data stream.

__3__

A firewall that can block designated types of traffic based on application data contained within packets.

1.

IPS

2.

IDS

3.

content filtering

4.

HIDS

5.

stateful

6.

proxy server

7.

proxy service

8.

public key encryption

9.

private key encryption

Explanation / Answer

The host that runs the proxy service.

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

Software that can react to suspicious activity.

A firewall that protects only the computer on which it is installed.

Data is encrypted using a single key.

Data is encrypted using two keys.

Software that can only detect and log suspicious activity.

A firewall that can view a data stream.

A firewall that can block designated types of traffic based on application data contained within packets.

__6__

The host that runs the proxy service.

__7__

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

__2__

Software that can react to suspicious activity.

__4__

A firewall that protects only the computer on which it is installed.

__9__

Data is encrypted using a single key.

__8__

Data is encrypted using two keys.

__1__

Software that can only detect and log suspicious activity.

__5__

A firewall that can view a data stream.

__3__

A firewall that can block designated types of traffic based on application data contained within packets.