Cisco Networking Module 15/Security Terms/Security considerations
What characteristic describes antivirus software
Applications that protect and services from becoming infected with malicious software
What characteristic describes antivirus software
Applications that protect end devices from becoming infected with malicious software
What characteristic describes anti-spam
Software that identifies email spam and automatically deletes or places them in a junk folder
What is the primary means for mitigating virus and Trojan horse attacks
Antivirus software
What is an example of social engineering
An unidentified person claiming to be a technician collecting user information from employees
What characteristic describes a firewall appliance
A network device that filters access in traffic coming into a network
Which type of technology can prevent malicious software from monitoring user activities collecting personal information and producing unwanted pop up ads on a user computer
Anti-spyware
What characteristic describes a DOS attack
An attack that slows are crashes a device or network service
What characteristic describes a DOS attack
An attack that slows or crashes a device or network service
What type of attack is the ping of death
Denial of Service
Which type of attack attempts to overwhelm network links and devices with useless data
Denial of service
How does a phisher typically contact a victim
Which malicious program appears as a legitimate program to deceive the victim but is in fact an attack tool that can contain malicious code
Trojan horse
What characteristic describes phishing
An email pretending to represent a legitimate organization asking for personal information
What is the term used when a malicious party since a fraudulent email disguised as being from a legitimate trusted source
Phishing
What type of DOS attack originates from a malicious host that has an invalid source IP address and that request a client connection
SYN flooding
What type of program installs and gathers personal information including password and account information from a computer without permission or knowledge of the user
Spyware
What characteristic describes identity theft
The use of stolen credentials to access private data
What characteristic describes adware
Software that is installed on a user device and collects information about the user
What characteristic describes spyware
Software that is installed on a user device and collects information about the user
What characteristic describes a virus
Malicious software or code running on an end device
What characteristic describes a Trojan horse
Malicious software or code running on an end device