CIS 311
botnet
malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
a layered approach to security
Defense in depth can best be described as which of the following?
use DoS attacks on Web sites with which they disagree
a hactivist can best be described as which of the following?
open sockets
what can an attacker use a port scanner to test for on a target computer?
trojan
what is a program that appears to do something useful but is actually malware?
quarantine
what is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
checksum
which of the following is NOT information that a packet filter uses to determine whether to block a packet?
inpartiality
which of the following is NOT one of the three primary goals of information security?
macro * wrong
which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
authentication
which security layer verifies the identity of a user, service, or a computer?
IDPS
which security tools works by recognizing signs of a possible attack and sending notification to an administrator?
Social Engineering
which term is best described as an attack that relies on the gullibility of people?
man-in-the-middle
which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
so a user can't deny sending or receiving a communication
why might you want your security system to provide nonrepudiation?
discretionary access control *wrong
with which access control method do system administrative establish what information user can share?