Chapter 19 Test - Protecting Your Network || A Verified A+ Pass.
0 view 0 purchase
Course
Chapter 19 - Protecting Your Network || A Ver
Institution
Chapter 19 - Protecting Your Network || A Ver
Which type of malware looks or pretends to do one thing while, at the same time, doing something evil? correct answers Trojan
Which type of attack involves the attacker tapping into communications between two systems? correct answers MITM or on-path
A(n) __________ is a computer that presents...
Chapter 19 Test - Protecting Your Network || A Verified A+
Pass.
Which type of malware looks or pretends to do one thing while, at the same time, doing
something evil? correct answers Trojan
Which type of attack involves the attacker tapping into communications between two systems?
correct answers MITM or on-path
A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in
reality, is a decoy. correct answers honeypot
What type of agent is composed of modules that perform a thorough inventory of each security-
oriented element in the computer? correct answers persistent
A(n) __________ host is simply a machine that is fully exposed to the Internet. correct answers
bastion
ARP poisoning is a common method for __________ attacks. correct answers man-in-the-middle
attacks (MiTM)
Which type of firewall is built into most consumer-grade routers? correct answers SOHO
firewall (small office/home office)
Fingerprint readers, facial recognition cameras, voice analyzers, and retinal blood vessel
scanners are all examples of __________. correct answers biometric devices
One of the first techniques that malicious users try is to probe hosts to identify any __________
ports. correct answers open
Which technology consists of devices or software that protect an internal network from
unauthorized access by acting as a filter? correct answers firewalls
__________ can run on a single computer or within a virtual machine and can look like a simple
network or a vast installation. correct answers Honeynets
Which term refers to a function of any program that sends information about your system or your
actions over the Internet? correct answers spyware
Which type of firewall packet inspection examines each packet fresh, with no regard to the state
of the packet's relation to any other packet? correct answers stateless
Firewalls consider traffic as either __________. correct answers inbound or outbound
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.