Chapter1 CISS 320

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a program that appears to do something useful but is actually malware?

Trojan

What tool do you use to secure remote access by users who utilize the Internet?

VPN

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

macro

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

man-in-the-middle

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

RPC attacks

Defense in depth can best be described as which of the following?

a layered approach to security

What can an attacker use a port scanner to test for on a target computer?

open sockets

What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

quarantine

What is a VPN typically used for?

secure remote access

Which term is best described as an attack that relies on the gullibility of people?

social engineering

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

IDPS

Which security layer verifies the identity of a user, service, or computer?

authentication

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

botnet

In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

challenge/response

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

checksum


Ensembles d'études connexes

Macroeconomics Test 1 Chapters 1,2,3

View Set