Exam 9: Computer Security Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A stateful packet inspection firewall examines each packet,and denies or permits access based not only on the current packet,but also on data derived from previous packets in the conversation.

Free
(True/False)
5.0/5
(37)
Correct Answer:
Verified

True

The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection.

Free
(True/False)
4.7/5
(25)
Correct Answer:
Verified

True

A packet-filtering firewall is a(n)____________ firewall.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

A

An on-demand virus scanner runs in the background and is constantly checking your PC.

(True/False)
4.8/5
(36)

A list of virus definitions is generally in a file with a ________ extension.

(Multiple Choice)
4.7/5
(35)

A file that stays in memory after it executes is a(n)_____________.

(Multiple Choice)
4.8/5
(24)

Heuristic scanning uses rules to determine whether a file or program behaves like a virus.

(True/False)
4.7/5
(34)

A screening firewall works in the application layer of the OSI model.

(True/False)
4.8/5
(35)

A _________ is a barrier between your network and the outside world.

(Multiple Choice)
4.9/5
(33)

Linux and Windows typically are not shipped with firewalls.

(True/False)
4.9/5
(34)

The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.

(True/False)
4.8/5
(41)

Mistaking a legitimate program for a virus is a ____________.

(Multiple Choice)
4.8/5
(31)

Typically,when you update virus definitions _____________.

(Multiple Choice)
4.7/5
(26)

A server with fake data used to attract an attacker is a honeypot.

(True/False)
4.9/5
(31)

A firewall ______ is a tool that can provide information after an incident has occurred.

(Multiple Choice)
4.9/5
(39)

Java and ActiveX codes should be scanned before they are _________.

(Multiple Choice)
4.9/5
(47)

A(n)___________ firewall examines the entire conversation between client and server,not just individual packets.

(Multiple Choice)
4.7/5
(32)

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run,so it won't infect the system is ________.

(Multiple Choice)
4.9/5
(35)

The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

(Multiple Choice)
4.9/5
(30)

In which firewall configuration is the firewall running on a server with at least two network interfaces?

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 23
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)