The other three choices do not use rules or rulesets. A sensor is an intrusion detection and prevention system (IDPS) component that monitors and analyzes network activity. A switch is a mechanical, electromechanical, or electronic device for making, breaking, or changing the connections in or among circuits. A hardware/software guard is designed to provide a secure information path for sharing data between multiple system networks operating at different security levels. A gateway transfers information and converts it to a form compatible with the receiving network’s protocols. A connector is an electromechanical device on the ends of cables that permit them to be connected with, and disconnected from, other cables. A concentrator gathers together several lines in one central location.
279. Countermeasures against sniffers do
a. Using recent version of secure shell protocol.
b. Applying end-to-end encryption.
c. Using packet filters.
d. Implementing robust authentication techniques.
280. Secure remote procedure call (RPC) provides which one of the following security services?
a. Authentication
b. Confidentiality
c. Integrity
d. Availability
281. Which of the following does
a. Extensible markup language (XML) encryption
b. Web services security (WS-Security)
c. Advanced encryption standard (AES)
d. Hypertext transfer protocol secure (HTTPS)
The other three choices provide confidentiality protection for Web services because most Web service data is stored in the form of extensible markup language (XML). Using XML encryption before storing data should provide confidentiality protection while maintaining compatibility. Web services security (WS-Security) and HTTPS are generally used to protect confidentiality of simple object access protocol (SOAP) messages in transit, leaving data at rest vulnerable to attacks.
282. Firewalls cannot provide a “line of perimeter defense” against attacks from which of the following?
a. Traffic entering a network
b. Traffic to and from the Internet
c. Traffic to host systems
d. Traffic leaving a network
283. Sources of legal rights and obligations for privacy over electronic mail do
a. Law of the country
b. Employer practices
c. Employee practices
d. Employer policies