Exam 1: Network Security Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

(Multiple Choice)
4.9/5
(37)

Which security layer verifies the identity of a user,service,or computer?

(Multiple Choice)
4.9/5
(34)

A worm creates files that copy themselves repeatedly and consume disk space.

(True/False)
4.8/5
(40)

MATCHING -An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked

(Multiple Choice)
4.9/5
(37)

Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

(True/False)
4.8/5
(31)

What is malicious port scanning and how can you defend against it?

(Essay)
4.8/5
(36)

What is virus scanning and how does it work?

(Essay)
5.0/5
(30)

With which access control method do system administrators establish what information users can share?

(Multiple Choice)
4.8/5
(41)

______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.

(Short Answer)
5.0/5
(33)

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

(Multiple Choice)
4.8/5
(36)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)