Exam 23: Security Software
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.
A
Discuss the process of guessing a password.
Guessing a password can be a completely random approach. Just typing in words or combinations of letters, numbers, and symbols until one of them works, however, does not stand much of a chance at success. Often it is not even necessary to crack a password, as the user has made it easy for you to determine the password with little effort. This could be as simple as the user placing a sticky note on the bottom of their keyboard with their username and password written out clearly. Perhaps the user has created a password that is composed of information commonly known about the individual, such as their birthday, children or pet names, favorite color, nickname, or other personally relevant information. Does the user have a custom license plate? That should go on the list of possible passwords too. These are all examples of a weak password.
A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.
active IDS
The command ____ translates certain names into their associated IP addresses or port numbers.
A(n) ____________________ describes the steps needed to execute the policy.
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.
Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.
A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.
A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.
The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)