Term
| Often devices most vulnerable to attack are those that provide services to inside users |
|
Definition
|
|
Term
| In a company of 500 employees it is estimated that ____ employees would be required to combat a virus attack |
|
Definition
|
|
Term
| A _________ virus can interrupt almost any function executed by the computer operating system and alter it for it's own malicious purposes |
|
Definition
|
|
Term
| _________ is an image spam that is divided into multiple images |
|
Definition
|
|
Term
| _________ is a means of managing and presenting computer resources by function without regard to their physical layout or location |
|
Definition
|
|
Term
| The goal of _____ is to make it harder to predict where the operating system functionality resides in the memory |
|
Definition
|
|
Term
| The _____ _____ are operating system settings that impose how the policy will be enforced |
|
Definition
|
|
Term
| BitTorrent maximizes the transfer speed by gathering pieces of the file and downloading these pieces simulataneously from users who already have them (the collective pieces are called a _____) |
|
Definition
|
|
Term
| _____ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What type of attack makes a copy of data before sending it on to the intended host? |
|
Definition
|
|
Term
| Substituting fraudulent IP address by targeting external dns server |
|
Definition
|
|
Term
| DNS poisoning can be prevented by using the latest editions of the DNS software, _____ |
|
Definition
|
|
Term
| An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as _____ |
|
Definition
|
|
Term
| _____ enables the attacker's computer to forward any network traffic it receives from Computer A to the actual router |
|
Definition
|
|
Term
| _____ examines the current state of a system or network device before it is allowed to connect to the network |
|
Definition
|
|
Term
| _____ honeypots are mainly used by organizations to capture limited information regarding attacks on that organization's honeypot. |
|
Definition
|
|
Term
| An _____ finds malicious traffic and deals with it immediately |
|
Definition
|
|
Term
| A _____ is an instruction that interrupts the program being executed and requests a service from the operating system |
|
Definition
|
|
Term
| _____ work to protect the entire network and all devices that are connected to it |
|
Definition
|
|
Term
| _____ are designed to inspect traffic, and based on their configuration or security policy, they can drop maliciuos traffic |
|
Definition
|
|
Term
| _____ can fully decode application layer network protocols. Once these protocols are decoded, the different parts of the protocol can be analyzed for any suspicious behavior. |
|
Definition
|
|
Term
| At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as _____ |
|
Definition
|
|
Term
| Mobile devices constantly survey the radio frequencies at regular intervals to determine if a different AP can provide better service. If it finds one, then the device automatically attempts to associate with the new AP (this process is called _____) |
|
Definition
|
|
Term
| Encryption under the WPA2 personal security model is accomplished by _____ |
|
Definition
|
|
Term
| SAN can be shared between servers but cannot be extended over geographical distances |
|
Definition
|
|
Term
| Because NAS operates at the file system level, NAS security cannot be implemented through the standard operating system features |
|
Definition
|
|
Term
| Signed Java applets by default run in the sandbox and are restricted regarding what they can do? |
|
Definition
| False, they are trusted and run outside the sandbox |
|
|