1. ________ help(s) ensure that important network traffic receives high? priority, and? less-critical network traffic receives lower priority.
A. Public key infrastructure B. Deep packet inspection? (DPI) C. Information technology? (IT) D. Managed security service providers? (MSSP) E. ?Fault-tolerant computer systems
2. ________ is used to ensure the person is who? he/she claims to be.
A. Authentication B. An encryption C. Knowledge management D. Data mining E. A production worker
3. An intrusion detection system? (IDS) ________.
A. is a hardware component related to computer monitors B. causes damage to a system C. creates phishing problems D. helps protect a system using? full-time monitoring tools E. is a social media application
4. ________ are data files used to identify and protect online transactions using a trusted third party.
A. Digital certificates B. SSL C. Analog certificates D. Analog confirmations E. Digital confirmations