Exam 8: Network Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size,and internal instructions)to avoid detection?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

Matching Match each correct item with the statement below. -A program that runs independently and travelsbetween computers and across networks.Although wormsdo not alter other programs as viruses do,they can carryviruses.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

J

What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?

(Multiple Choice)
4.8/5
(29)

Matching Match each correct item with the statement below. -A specification created by the NSA to define protectionstandards against RF emanation,which when implementedare called EmSec (emission security).

(Multiple Choice)
4.7/5
(42)

If multiple honeypots are connected to form a larger network,what term is used to describe the network?

(Multiple Choice)
4.9/5
(36)

Describe some of the characteristics of malware that make it difficult to detect.

(Essay)
4.8/5
(35)

A reflective attack can be increased in intensity by combining it with what type of attack?

(Multiple Choice)
4.9/5
(34)

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?

(Multiple Choice)
4.7/5
(29)

The ________________ utility is a Windows console that is used to control what users do and how the system can be used.

(Short Answer)
4.8/5
(32)

Define what a file-infector virus is.

(Essay)
4.8/5
(29)

Different types of organizations have similar levels of network security risks.

(True/False)
4.9/5
(28)

What type of virus are dormant until a specific condition is met,such as the changing of a file or a match of the current date?

(Multiple Choice)
4.8/5
(32)

Which software below serves as the firewall for Linux systems?

(Multiple Choice)
4.8/5
(34)

Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?

(Multiple Choice)
4.9/5
(35)

Matching Match each correct item with the statement below. -A type ofintrusion detection that runs on a single computer,such as aclient or server,to alert about attacks against that one host.

(Multiple Choice)
4.9/5
(33)

Matching Match each correct item with the statement below. -A portion of the security policythat explains to users what they can and cannot do,andpenalties for violations.It might also describe how thesemeasures protect the network's security.

(Multiple Choice)
4.9/5
(35)

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?

(Multiple Choice)
4.8/5
(43)

Matching Match each correct item with the statement below. -A type ofintrusion prevention that runs on a single computer,such as aclient or server,to intercept and help prevent attacks againstthat one host.

(Multiple Choice)
4.7/5
(30)

A system that is capable of collecting and analyzing information generated by firewalls,IDS,and IPS systems is known as which term below?

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)