Cisco Networking Module 15/Security Terms/Security considerations

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What characteristic describes antivirus software

Applications that protect and services from becoming infected with malicious software

What characteristic describes antivirus software

Applications that protect end devices from becoming infected with malicious software

What characteristic describes anti-spam

Software that identifies email spam and automatically deletes or places them in a junk folder

What is the primary means for mitigating virus and Trojan horse attacks

Antivirus software

What is an example of social engineering

An unidentified person claiming to be a technician collecting user information from employees

What characteristic describes a firewall appliance

A network device that filters access in traffic coming into a network

Which type of technology can prevent malicious software from monitoring user activities collecting personal information and producing unwanted pop up ads on a user computer

Anti-spyware

What characteristic describes a DOS attack

An attack that slows are crashes a device or network service

What characteristic describes a DOS attack

An attack that slows or crashes a device or network service

What type of attack is the ping of death

Denial of Service

Which type of attack attempts to overwhelm network links and devices with useless data

Denial of service

How does a phisher typically contact a victim

Email

Which malicious program appears as a legitimate program to deceive the victim but is in fact an attack tool that can contain malicious code

Trojan horse

What characteristic describes phishing

An email pretending to represent a legitimate organization asking for personal information

What is the term used when a malicious party since a fraudulent email disguised as being from a legitimate trusted source

Phishing

What type of DOS attack originates from a malicious host that has an invalid source IP address and that request a client connection

SYN flooding

What type of program installs and gathers personal information including password and account information from a computer without permission or knowledge of the user

Spyware

What characteristic describes identity theft

The use of stolen credentials to access private data

What characteristic describes adware

Software that is installed on a user device and collects information about the user

What characteristic describes spyware

Software that is installed on a user device and collects information about the user

What characteristic describes a virus

Malicious software or code running on an end device

What characteristic describes a Trojan horse

Malicious software or code running on an end device


Ensembles d'études connexes

From Inquiry to Academic Writing: Chap. 4 & 5

View Set

MKTG 454 Midterm - USC - Quackenbos

View Set

MANA3335 MindTap Case Activity: Chapter 05: Entrepreneurship and New Venture Management

View Set

The Cardiovascular System-The Blood

View Set