Online Connections Quiz 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the term used to describe the area of a network which stores servers that are accessible to any users from the Internet?

DMZ

Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

SSID

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​

SYN flooding

What characteristic describes a DoS attack?

an attack that slows or crashes a device or network service

What is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

spyware

Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

What type of attack is the ping of death?

Denial of Service

Which two actions improve security on a wireless network? (Choose two.)

Enabling WEP and MAC filtering

Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?​

Trojan horse

A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

WPA2 specifies the use of a dynamic encryption key.

What characteristic describes a firewall appliance?

a network device that filters access and traffic coming into a network

What type of authentication do most access points use by default?

open

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

phishing

What characteristic describes adware?

software that is installed on a user device and collects information about the user

What characteristic describes identity theft?

the use of stolen credentials to access private data

What is the purpose of a wireless SSID?

to uniquely indentify a wireless network

What characteristic describes a virus?

malicious software or code running on an end device

What is the purpose of a DMZ?

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

MAC filtering

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

antispyware

What is the primary means for mitigating virus and Trojan horse attacks?

antivirus software

What characteristic describes antivirus software?

applications that protect end devices from becoming infected with malicious software

What characteristic describes phishing?

applications that protect end devices from becoming infected with malicious software

Which type of attack attempts to overwhelm network links and devices with useless data?

denial of service

How does a phisher typically contact a victim?

email

Which component is designed to protect against unauthorized communications to and from a computer?

firewall

What characteristic describes a Trojan horse?

malicious software or code running on an end device

What characteristic describes antispam?

software that identifies email spam and automatically deletes or places them in a junk folder

What characteristic describes spyware?

software that is installed on a user device and collects information about the user


Ensembles d'études connexes

Measure Profit Maximization (Chapter 14)

View Set

LIFE POLICY PROVISIONS OPTIONS AND RIDERS

View Set

CRPC YOU GOT THIS STUDY CARDS - MEMORIZE AND BE FAMILIAR WITH THESE AND YOU GOT THIS. FRIGGEN 110% PASSING SCORE.

View Set

maternity : test 2Chapter 19 OB: test 2

View Set