Week 1 Quiz
What tool do you use to secure remote access by users who utilize the Internet?
VPN
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
botnet
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
IDPS
Which of the following is NOT one of the three primary goals of information security?
impartiality
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
macro
Defense in depth can best be described as which of the following?
a layered approach to security
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
challenge/response
Copy of What can an attacker use a port scanner to test for on a target computer?
open sockets
What can an attacker use a port scanner to test for on a target computer?
open sockets
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
quarantine
Which type of firewall policy calls for a firewall to deny all traffic by default?
restrictive policy