1. Worms are able to self-replicate. A. True B. False 2. You have created a Web site and need to increase visitor trust. Which of the following methods are used to build trust? (Select two.) A. Logos B. Testimonials C. Color choice D. Font size 3. IDS and IPS systems are a replacement for a firewall system. A. True B. False 4. Which of the following attack types is based on faking the real source of a transmission, file, or e-mail? A. Backdoor B. DDoS C. Spoofing D. Front door 5. To increase network security, you have decided to block port 21 . Which of the C. DNS D. SFTP 6. A ( n ) is a passive network monitoring and security system. 7. Servers within the DMZ sit outside of the local network. A. True B. False 8. Port is used by the HTTP protocol. 9. A sits between the Internet and the client systems responding to client requests for Web pages. 10. Which of the following best describes the function of the DNS server? A. Uses Media Access Control addresses to locate network systems B. Provides host name-to-IP resolution C. Provides IP name resolution D. Encrypts host names 11. A DoS attack is designed to overwhelm a particular resource making it unavailable. A. True B. False .