Q: Which of the following statements about advanced ICT security measures in institutions are correct?
(A) Firewalls can filter incoming and outgoing network traffic based on defined security rules;
(B) Intrusion detection or prevention systems can monitor networks for suspicious activity;
(C) Using a single, shared administrator password for all systems improves accountability;
(D) Two-factor authentication adds an extra layer of security beyond username and password;
(E) Regular security audits and vulnerability assessments can identify weaknesses in ICT infrastructure;
(F) Encrypting data in transit is unnecessary if internal networks are considered trusted by default;
Choose the correct answer from the options given below:
Q: Which of the following statements about common network security devices are correct?
(A) A firewall monitors and controls network traffic based on predefined security rules;
(B) Intrusion Detection Systems (IDS) can alert administrators about suspicious activities on the network;
(C) A firewall always guarantees that no security incident can ever occur;
(D) Combining firewalls with other security measures is a common defence-in-depth strategy;
Choose the correct answer from the options given below:

Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!