Cita 120 Chapter 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Security policies

A set of these should exist in both document form and software form for any organization.

Too many failed attempts

After several failed attempts to log on/sign in to your Windows computer you see a message stating that your account has been locked out. What caused this problem?

proxy service

Also called an application-layer gateway, this software will watch for application-specific traffic, acting as a stand-in for internal computers

social engineering

An e-mail containing enticements (often appealing to human weaknesses) to open attachments is a form of what type of threat?

VPN

Combine this technology with a firewall for a very safe way to connect two private networks over the Internet

DMZ

If your private network has both client computers needing Internet access and servers that must be available from the Internet, you should create this separate network for those servers in order to keep Internet-initiated traffic from entering the network containing your client computers. What is the term for the network where the servers are located?

personal firewall

It is a good idea to install or enable one of these on your computer, even if your network has similar protection between it and other networks

rootkit

Once installed, this type of malware becomes a vector giving other malware administrative access to a computer

pop-up download

This method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page. If you click within the window, you may unknowingly agree to install malware.

firewall

This software or hardware device examines network traffic and allows or rejects traffic into a network or computer based on predefined rules

digital certificate

This special file holds a secret key

spam filter

This type of software protects against unsolicited e-mail, filtering out those that have certain characteristics

Parental Controls

To enable and configure this security feature in Windows Internet Options, you must use a password-protected administrator type account and apply this feature to an existing standard account.

pop-up blocker

Use this type of program to guard against an especially annoying type of adware that appears in your browser and blocks the content you want to see

vector

What is the generic term for a mode or method of malware infection?

sneakernet

What is the oldest malware vector?

botnet

What term describes a group of networked computers infected with malware that forward information to other computers

brute-force

What term describes a password cracker that tries a huge number of possible passwords?

zero-day exploit

What term describes malware that takes advantage of a vulnerability in an operating system or application that is (as yet) unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched?

spim

What term describes unsolicited instant messages?

zombie

What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers?

Trojin horse

What type of malware is also a vector and gets its name from one of Homer's tales of the ancient Greeks?

adware

What type of malware is spyware that collects information about the user's browsing habits in order to display advertisements in the browser targeted to that user?

worm

What type of malware replicates itself on a computer or throughout a network?

antivirus

What type of security software can you use to both protect from malware infections and also to scan disk space and RAM looking for installed malware

browser hijacking

What type of threat points your browser's home page to a website you did not chose, and may even keep you from changing the default home page for the browser?

sudden computer slowdown

Which of the following is among the symptoms of a possible malware infection?

UAC

You attempt to install software in Windows; and although you are logged on with a computer administrator type of account, your screen turns grey and you receive a message asking if you want to allow the program to make changes to the computer. What Windows feature is at work here?

hoax

You receive an e-mail message from a friend's e-mail address claiming that she is in another country, in trouble, and urgently needs money wired to her. You call the friend, and discover that she is safe at home and did not know about the message. This scenario is an example of a/an ____________

Administrator

Your computer has been showing signs of a malware infection, and today it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what all-powerful built-in account can you log on with?


संबंधित स्टडी सेट्स

Chapter 6 - Maintaining System Startup and Services

View Set

20th Century Music History Test 3

View Set

Chapter 10 Section 4: The Members of Congress

View Set

Post Traumatic Stress Disorder (PTSD)- Final

View Set

CompTIA A+ Core 2 Lesson 8 Quiz - Managing Security Settings

View Set

Project Management Chapter 4 SB & Quiz

View Set

English Antigone Study Guide (know who said quotes)

View Set

Practice Test Assessment Performance

View Set