Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

5. ________ help(s) ensure that important network traffic receives high priority

ID: 365777 • Letter: 5

Question

5. ________ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority. A. Public key infrastructure B. Deep packet inspection (DPI) C. Information technology (IT) D. Managed security service providers (MSSP) E. Fault-tolerant computer systems 6. ________ is used to ensure the person is who he/she claims to be. A. Authentication B. An encryption C. Knowledge management D. Data mining E. A production worker 7. An intrusion detection system (IDS) ________. A. is a hardware component related to computer monitors B. causes damage to a system C. creates phishing problems D. helps protect a system using full-time monitoring tools E. is a social media application 8. ________ are data files used to identify and protect online transactions using a trusted third party. A. Digital certificates B. SSL C. Analog certificates D. Analog confirmations E. Digital confirmations

Explanation / Answer

Que 5

Answer should be

B. Deep packet inspection (DPI)

Because it is the virtualized network poses challenges to network management systems

Que 6

Answer should be

A. Authentication

Because by this you get the approval to reimburse the claim

Que 7

Answer should be

D. helps protect a system using full-time monitoring tools

Because An IDS is used to protect and report network abnormalities to a network administrator or system.

Que 8

Answer should be

A. Digital certificates

Because its used for data files used to establish the identity of users and electronic assets for protection of online transactions.