Exam 22: Understanding Firewalls

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.

Free
(Short Answer)
4.7/5
(41)
Correct Answer:
Verified

hacker

Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

C

________ floods a computer with requests until it shuts down denying access to legitimate users.

(Multiple Choice)
4.7/5
(29)

A good way to keep hackers out of a computer is to install a(n) ________.

(Short Answer)
4.8/5
(36)

A firewall designed specifically for home networks is called a ________ firewall.

(Multiple Choice)
4.8/5
(30)

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

(Multiple Choice)
4.9/5
(31)

ShieldsUP and LeakTest are software programs you can use to test whether ________.

(Multiple Choice)
4.8/5
(21)

Attacks that are launched from multiple zombie computers at the same time are called ________.

(Multiple Choice)
4.8/5
(34)

Match each of the following terms to its meaning: I. firewall II. hacker III. packet IV. botnet V. virus A. prevents intrusion into your computer B. a small program that can compromise a computer system C. small piece of data that travels through the Internet D. a person who poses a threat to your computer E. group of software programs that usually run independently on a large number of zombie computers

(Short Answer)
4.8/5
(30)

A large group of software programs that runs autonomously on zombie computers is called a(n) ________.

(Short Answer)
4.9/5
(29)

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

(Multiple Choice)
5.0/5
(34)

Match each of the following terms to its definition: I. packet filtering II. zombie III. firewall IV. network address translation V. packet sniffer A. technique of assigning hidden internal IP addresses to protect a network against hackers B. method for selectively allowing certain requests to access a port C. hardware or software for protecting computers from hackers D. a computer controlled by a hacker E. program used by hackers to look at individual packets as they travel on the Internet

(Short Answer)
4.8/5
(34)

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.

(Short Answer)
4.9/5
(35)

________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.

(Short Answer)
4.7/5
(35)

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.

(Short Answer)
4.8/5
(41)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)