Week 1 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What tool do you use to secure remote access by users who utilize the Internet?

VPN

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

botnet

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

IDPS

Which of the following is NOT one of the three primary goals of information security?

impartiality

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

macro

Defense in depth can best be described as which of the following?

a layered approach to security

In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

challenge/response

Copy of What can an attacker use a port scanner to test for on a target computer?

open sockets

What can an attacker use a port scanner to test for on a target computer?

open sockets

What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

quarantine

Which type of firewall policy calls for a firewall to deny all traffic by default?

restrictive policy


Conjuntos de estudio relacionados

AP Environmental Science Chapter 1- Environment and Sustainability

View Set

Computer Science Praxis Exam Questions

View Set

Osteopathic Principles & Practice, Term 2

View Set

MRU14.1: INTRODUCTION TO PRICE DISCRIMINATION

View Set

Add, Subtract, Multiply & Divide Fractions

View Set

The invention of the light bulb.

View Set

Code Plus - deel 1 - Hoofdstuk 1 - Introductie

View Set

Chapter 14: The Brain and Cranial Nerves

View Set