Exam 9: Computer Security Software
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
A stateful packet inspection firewall examines each packet,and denies or permits access based not only on the current packet,but also on data derived from previous packets in the conversation.
Free
(True/False)
5.0/5
(37)
Correct Answer:
True
The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection.
Free
(True/False)
4.7/5
(25)
Correct Answer:
True
A packet-filtering firewall is a(n)____________ firewall.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
A
An on-demand virus scanner runs in the background and is constantly checking your PC.
(True/False)
4.8/5
(36)
A list of virus definitions is generally in a file with a ________ extension.
(Multiple Choice)
4.7/5
(35)
A file that stays in memory after it executes is a(n)_____________.
(Multiple Choice)
4.8/5
(24)
Heuristic scanning uses rules to determine whether a file or program behaves like a virus.
(True/False)
4.7/5
(34)
A screening firewall works in the application layer of the OSI model.
(True/False)
4.8/5
(35)
A _________ is a barrier between your network and the outside world.
(Multiple Choice)
4.9/5
(33)
The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.
(True/False)
4.8/5
(41)
Mistaking a legitimate program for a virus is a ____________.
(Multiple Choice)
4.8/5
(31)
A server with fake data used to attract an attacker is a honeypot.
(True/False)
4.9/5
(31)
A firewall ______ is a tool that can provide information after an incident has occurred.
(Multiple Choice)
4.9/5
(39)
Java and ActiveX codes should be scanned before they are _________.
(Multiple Choice)
4.9/5
(47)
A(n)___________ firewall examines the entire conversation between client and server,not just individual packets.
(Multiple Choice)
4.7/5
(32)
The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run,so it won't infect the system is ________.
(Multiple Choice)
4.9/5
(35)
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
(Multiple Choice)
4.9/5
(30)
In which firewall configuration is the firewall running on a server with at least two network interfaces?
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 23
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)