computer security multi

¡Supera tus tareas y exámenes ahora con Quizwiz!

blowfish is

A symmetric block cipher

which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price.

Bid siphoning

____ attacks are becoming less common in modern operating systems.

Buffer overflow

the attack in which the attacker sends a package that is too large and can shut down a target machine is a _____ attack

Ping of death

What is PGP

Pretty good Privacy, a symmetric key encryption method

One tool used for the denial of service attack is

Tribal Flood Network

There are several action to rake when handling a security breach. Which of the following should be done last?

study the breach to learn how to prevent a recurrence

what must all policies have in order to be effective

they must be properly filed and maintained

A program that looks benign and maybe even useful but actually has a malicious purpose is a

trojan horse

one way to protect yourself on auction sites is

use a separate credit card with a low limit

the most common way for a virus to spread is by

use of your email contacts

firefor and internet explorer are examples of

web browsers

which of the following is most true for new encryption methods?

you can use them, but you must be cautious

the recommended internet explorer privacy setting is

medium

which of the following is the process to try to induce someone to provide you with personal information

phishing

the IP utility used to test connectivity with a remote host is

ping

what is a commonly used rule for employee access control in an organization

provide the least access required to perform the job

a ___ hides the internal networks IP address and presents a single IP address to the outside world

proxy server

which of the following is a common was to establish security between a web sever and a network

put a firewall between the web server and the network

what is a buffer overflow attack

putting more data in a buffer than it can hold

which device is used to boost a signal

repeater

which device can relay packets from one network to another and is usually programmable.

router

someone who calls himself a hacker but lacks the expertise is a

script kiddy

which type of hacking occurs when the attacker monitors an authenticated session between the client and the server and takes over that session

session hijacking

what can you do with a firewall to help protect against virus attacks

shut down all unneeded ports

a Key logger is what type of malware

spyware

which of these is a process to determine if the credentials given by a user or another system are authorized to access the network resource in question

Authentication

which TCP/IP protocol operates one port 25 and sends email

SMTP

which of the following is generally true of the room in which the server is located

all of the above(fire resistent, strong door and lock, limited access)

someone who gains access to a system and causes harm is a

black hat hacker

one defense against denial of service attacks is to _____ ICMP packets

block

what is the primary way a virus scanner works

by blocking the files that match a list of known virus profiles

a file on your computer that website use to store information about you is a

cookie

which of the following involves the internet to harass, threaten, or intimidate another person

cyberstalking

which type of attack attempts ti overload the system with requests denying legitimate user access

denial of service

which of the following is one way to protect yourself against identity theft

do not provide personal information to anyone if it is not absolutely nessacary

What term is used to descried the practice of using secret codes?

encryption

a ___ is a basic security device that filters traffic and is a barrier between a network and the outside world.

firewall

a___ is a basic security device that filters traffic and is a barrier between a network and the outside world

firewall

windows stores passwords using a method called

hashing

what term is for a fake system designed to lure intruders

honey pot

__ theft and __ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another persons personal data in some way that involves fraud or deception

identity


Conjuntos de estudio relacionados

AIC managment, legal entities & delivery methods exercise

View Set

Principles of Computer Security Ch3, AIS Ch 10, Security+ Chapter 8, ITSY 2442 MID TERM, HIPAA overview, Computer Security Chapter 18, Computer Security Chapter 19, Computer Security Chapter 25, HIPAA Privacy Rule, CIST 1130: Operating Systems Concep...

View Set

6th Grade - Unit 4 synonyms/antonyms

View Set

austere - vulnerable w syn and ant

View Set

M 1. Female reproductive system and pelvic anatomy (M 1 quizzes)

View Set

NREMT: Cardiology and resuscitation

View Set