________ provide secure outsider access to selected shared resources.
Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN
查看答案
________ link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.
Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN
A ________ is a service that allows you to connect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data.
A. VPN.
B. firewall.
C. IDS.
D. Intranet.
All of the following are examples of malicious code except:
A. viruses.
B. bots.
C. worms.
D. sniffers.
According to where detection takes place, intrusion detection systems can be divided into ________.
Anomaly IDS and host IDS
B. Anomaly IDS and misuse IDS
C. Anomaly IDS and network IDS
D. Host-based IDS and network IDS