Deck 9: Computer Security Software

Full screen (f)
exit full mode
Question
Mistaking a legitimate program for a virus is a ____________.

A)Heuristic error
B)False negative
C)False positive
D)None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
A list of virus definitions is generally in a file with a ________ extension.

A).dat
B).txt
C).vir
D)def
Question
The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.
Question
A screening firewall works in the application layer of the OSI model.
Question
The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection.
Question
A packet-filtering firewall is a(n)____________ firewall.

A)Packet Filgering
B)Application gateway
C)Circuit-level gateway
D)Domain gateway
Question
Snort is an open-source firewall.
Question
Heuristic scanning uses rules to determine whether a file or program behaves like a virus.
Question
Linux and Windows typically are not shipped with firewalls.
Question
A _________ is a barrier between your network and the outside world.

A)Firewall
B)Web server
C)File server
D)None of the above
Question
The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run,so it won't infect the system is ________.

A)Download
B)File
C)Heuristic
D)Sandbox
Question
When an administrator proactively seeks out intelligence on potential threats or groups,this is called infiltration.
Question
Java and ActiveX codes should be scanned before they are _________.

A)Downloaded to your computer
B)Known about
C)Infected
D)None of the above
Question
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

A)Download
B)File
C)Heuristic
D)Sandbox
Question
A server with fake data used to attract an attacker is a honeypot.
Question
A(n)___________ firewall examines the entire conversation between client and server,not just individual packets.

A)Stateful Packet Inspection
B)Packet filtering
C)Circuit-level gateway
D)Domain gateway
Question
Typically,when you update virus definitions _____________.

A)The virus program scans your computer.
B)Your computer restarts.
C)You are updating the virus definition file on your computer
D)None of the above
Question
A file that stays in memory after it executes is a(n)_____________.

A)Terminate and Stay Resident program
B)Executable
C)Text file
D)Bug
Question
A stateful packet inspection firewall examines each packet,and denies or permits access based not only on the current packet,but also on data derived from previous packets in the conversation.
Question
An on-demand virus scanner runs in the background and is constantly checking your PC.
Question
In which firewall configuration is the firewall running on a server with at least two network interfaces?

A)Network host-based
B)Dual-homed host
C)Router-based
D)Screened host
Question
A firewall ______ is a tool that can provide information after an incident has occurred.

A)Log
B)Scan
C)Port
D)None of the above
Question
In which firewall configuration is the software installed on an existing machine with an exiting operating system?

A)Network host-based
B)Dual-homed host
C)Router-based
D)Screened host
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Computer Security Software
1
Mistaking a legitimate program for a virus is a ____________.

A)Heuristic error
B)False negative
C)False positive
D)None of the above
C
2
A list of virus definitions is generally in a file with a ________ extension.

A).dat
B).txt
C).vir
D)def
A
3
The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.
False
4
A screening firewall works in the application layer of the OSI model.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
A packet-filtering firewall is a(n)____________ firewall.

A)Packet Filgering
B)Application gateway
C)Circuit-level gateway
D)Domain gateway
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
Snort is an open-source firewall.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Heuristic scanning uses rules to determine whether a file or program behaves like a virus.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
Linux and Windows typically are not shipped with firewalls.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
A _________ is a barrier between your network and the outside world.

A)Firewall
B)Web server
C)File server
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run,so it won't infect the system is ________.

A)Download
B)File
C)Heuristic
D)Sandbox
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
When an administrator proactively seeks out intelligence on potential threats or groups,this is called infiltration.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
Java and ActiveX codes should be scanned before they are _________.

A)Downloaded to your computer
B)Known about
C)Infected
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

A)Download
B)File
C)Heuristic
D)Sandbox
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
A server with fake data used to attract an attacker is a honeypot.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
A(n)___________ firewall examines the entire conversation between client and server,not just individual packets.

A)Stateful Packet Inspection
B)Packet filtering
C)Circuit-level gateway
D)Domain gateway
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
Typically,when you update virus definitions _____________.

A)The virus program scans your computer.
B)Your computer restarts.
C)You are updating the virus definition file on your computer
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
A file that stays in memory after it executes is a(n)_____________.

A)Terminate and Stay Resident program
B)Executable
C)Text file
D)Bug
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
A stateful packet inspection firewall examines each packet,and denies or permits access based not only on the current packet,but also on data derived from previous packets in the conversation.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
An on-demand virus scanner runs in the background and is constantly checking your PC.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
In which firewall configuration is the firewall running on a server with at least two network interfaces?

A)Network host-based
B)Dual-homed host
C)Router-based
D)Screened host
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
A firewall ______ is a tool that can provide information after an incident has occurred.

A)Log
B)Scan
C)Port
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
In which firewall configuration is the software installed on an existing machine with an exiting operating system?

A)Network host-based
B)Dual-homed host
C)Router-based
D)Screened host
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.