service, characteristc
What service is provided by SMTP?
allows clients to send email to a mail server and the server to send email to other servers
What service is provided by FTP?
allows for data transfers between a client and a file server
What characteristic describes a DoS attack?
an attack that slows or crashes a devices or network service
What characteristic describes antispyware?
applications that protect en devices from becoming infected with malicious software
What characteristic describes antivirus software?
applications that protect end devices from becoming infected with malicious software
What service is provided by BOOTP?
legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network
What characteristic describes a Trojan horse?
malicious software or code running on an end device
What characteristic describes a virus?
malicious software or code running on an end device
What service is provided by POP3?
retrieves email from the server by downloading the email to the local mail application of the client
What service is provided by Internet Messenger?
An application that allows real-time chatting among remote users
What service is provided by DNS?
Resolves domain names, such as cisco.com into IP address
What service is provided by HTTP?
a basic set of rules for exchanging text, graphic images, sound, video and other multimedia files on the web
What characteristic describes an IPS?
a network device that filters access and traffic coming into a network
What characteristic describes a VPN?
a tunnelling protocol that provides remote users with secure access into the network of an organisation
What service is provided by DHCP?
dynamically assigns IP addresses to end and intermediary devices
What characteristic describes adware?
software that is installed on a user device and collects information about the user
What characteristic describes spyware?
software that is installed on a user device and collects information about the user
What characteristic describes identity theft?
the use of stolen credentials to access private data
What service is provided by HTTPS?
uses encryption to secure the exchange of text, graphic images, sound and video on the web