computer security multi
blowfish is
A symmetric block cipher
which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price.
Bid siphoning
____ attacks are becoming less common in modern operating systems.
Buffer overflow
the attack in which the attacker sends a package that is too large and can shut down a target machine is a _____ attack
Ping of death
What is PGP
Pretty good Privacy, a symmetric key encryption method
One tool used for the denial of service attack is
Tribal Flood Network
There are several action to rake when handling a security breach. Which of the following should be done last?
study the breach to learn how to prevent a recurrence
what must all policies have in order to be effective
they must be properly filed and maintained
A program that looks benign and maybe even useful but actually has a malicious purpose is a
trojan horse
one way to protect yourself on auction sites is
use a separate credit card with a low limit
the most common way for a virus to spread is by
use of your email contacts
firefor and internet explorer are examples of
web browsers
which of the following is most true for new encryption methods?
you can use them, but you must be cautious
the recommended internet explorer privacy setting is
medium
which of the following is the process to try to induce someone to provide you with personal information
phishing
the IP utility used to test connectivity with a remote host is
ping
what is a commonly used rule for employee access control in an organization
provide the least access required to perform the job
a ___ hides the internal networks IP address and presents a single IP address to the outside world
proxy server
which of the following is a common was to establish security between a web sever and a network
put a firewall between the web server and the network
what is a buffer overflow attack
putting more data in a buffer than it can hold
which device is used to boost a signal
repeater
which device can relay packets from one network to another and is usually programmable.
router
someone who calls himself a hacker but lacks the expertise is a
script kiddy
which type of hacking occurs when the attacker monitors an authenticated session between the client and the server and takes over that session
session hijacking
what can you do with a firewall to help protect against virus attacks
shut down all unneeded ports
a Key logger is what type of malware
spyware
which of these is a process to determine if the credentials given by a user or another system are authorized to access the network resource in question
Authentication
which TCP/IP protocol operates one port 25 and sends email
SMTP
which of the following is generally true of the room in which the server is located
all of the above(fire resistent, strong door and lock, limited access)
someone who gains access to a system and causes harm is a
black hat hacker
one defense against denial of service attacks is to _____ ICMP packets
block
what is the primary way a virus scanner works
by blocking the files that match a list of known virus profiles
a file on your computer that website use to store information about you is a
cookie
which of the following involves the internet to harass, threaten, or intimidate another person
cyberstalking
which type of attack attempts ti overload the system with requests denying legitimate user access
denial of service
which of the following is one way to protect yourself against identity theft
do not provide personal information to anyone if it is not absolutely nessacary
What term is used to descried the practice of using secret codes?
encryption
a ___ is a basic security device that filters traffic and is a barrier between a network and the outside world.
firewall
a___ is a basic security device that filters traffic and is a barrier between a network and the outside world
firewall
windows stores passwords using a method called
hashing
what term is for a fake system designed to lure intruders
honey pot
__ theft and __ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another persons personal data in some way that involves fraud or deception
identity