Term
Often devices most vulnerable to attack are those that provide services to inside users |
|
Definition
|
|
Term
In a company of 500 employees it is estimated that ____ employees would be required to combat a virus attack |
|
Definition
|
|
Term
A _________ virus can interrupt almost any function executed by the computer operating system and alter it for it's own malicious purposes |
|
Definition
|
|
Term
_________ is an image spam that is divided into multiple images |
|
Definition
|
|
Term
_________ is a means of managing and presenting computer resources by function without regard to their physical layout or location |
|
Definition
|
|
Term
The goal of _____ is to make it harder to predict where the operating system functionality resides in the memory |
|
Definition
|
|
Term
The _____ _____ are operating system settings that impose how the policy will be enforced |
|
Definition
|
|
Term
BitTorrent maximizes the transfer speed by gathering pieces of the file and downloading these pieces simulataneously from users who already have them (the collective pieces are called a _____) |
|
Definition
|
|
Term
_____ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch |
|
Definition
|
|
Term
|
Definition
|
|
Term
What type of attack makes a copy of data before sending it on to the intended host? |
|
Definition
|
|
Term
Substituting fraudulent IP address by targeting external dns server |
|
Definition
|
|
Term
DNS poisoning can be prevented by using the latest editions of the DNS software, _____ |
|
Definition
|
|
Term
An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as _____ |
|
Definition
|
|
Term
_____ enables the attacker's computer to forward any network traffic it receives from Computer A to the actual router |
|
Definition
|
|
Term
_____ examines the current state of a system or network device before it is allowed to connect to the network |
|
Definition
|
|
Term
_____ honeypots are mainly used by organizations to capture limited information regarding attacks on that organization's honeypot. |
|
Definition
|
|
Term
An _____ finds malicious traffic and deals with it immediately |
|
Definition
|
|
Term
A _____ is an instruction that interrupts the program being executed and requests a service from the operating system |
|
Definition
|
|
Term
_____ work to protect the entire network and all devices that are connected to it |
|
Definition
|
|
Term
_____ are designed to inspect traffic, and based on their configuration or security policy, they can drop maliciuos traffic |
|
Definition
|
|
Term
_____ can fully decode application layer network protocols. Once these protocols are decoded, the different parts of the protocol can be analyzed for any suspicious behavior. |
|
Definition
|
|
Term
At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as _____ |
|
Definition
|
|
Term
Mobile devices constantly survey the radio frequencies at regular intervals to determine if a different AP can provide better service. If it finds one, then the device automatically attempts to associate with the new AP (this process is called _____) |
|
Definition
|
|
Term
Encryption under the WPA2 personal security model is accomplished by _____ |
|
Definition
|
|
Term
SAN can be shared between servers but cannot be extended over geographical distances |
|
Definition
|
|
Term
Because NAS operates at the file system level, NAS security cannot be implemented through the standard operating system features |
|
Definition
|
|
Term
Signed Java applets by default run in the sandbox and are restricted regarding what they can do? |
|
Definition
False, they are trusted and run outside the sandbox |
|
|