Deck 10: Introduction to Network Security

Full screen (f)
exit full mode
Question
____ is the standard software service on many Linux distributions for authenticating users.

A)Password Policy
B)Shadow
C)MMC
D)PAM
Use Space or
up arrow
down arrow
to flip the card.
Question
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
Question
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.

A)PPTP
B)L2TP
C)PPP
D)SLIP
Question
____ allows administrators to control who has access to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Question
____ allows administrators to control what users can do after they are logged on to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Question
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
Question
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.

A)password
B)passwd
C)shadow
D)pwd
Question
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.

A)sharing
B)NTFS
C)folder
D)access
Question
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.

A)Digital
B)Kerberos
C)PAM
D)VPN
Question
A VPN is limited to dial-up connections.
Question
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).

A)PPTP
B)IDS
C)PPP
D)SLIP
Question
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.

A)IDS
B)VPN
C)rootkit
D)packet sniffer
Question
IPSec works by establishing a(n)____ between two communicating devices.

A)circuit
B)channel
C)association
D)tunnel
Question
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.

A)gpg
B)efs
C)ipsec
D)tar
Question
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.

A)IDSs
B)RRASs
C)Firewalls
D)VPNs
Question
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.

A)SSL
B)VPN
C)IPSec
D)SSH
Question
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
Question
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.

A)sharing
B)NTFS
C)folder
D)access
Question
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
Question
Spam is simply unsolicited e-mail.
Question
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
Question
What are the basic guidelines that a network security policy should follow?
Question
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.

A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
Question
What are the elements of a security policy? Briefly describe each.
Question
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
Question
A ____ is a program that spreads by replicating itself into other programs or documents.

A)worm
B)virus
C)backdoor
D)malware
Question
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.

A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
Question
What is a highly restrictive security policy?
Question
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.

A)spoofed address
B)ping flood
C)IDS
D)DoS
Question
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
Question
Digital certificates involve a third party called a(n)_________________________ (CA).
Question
Describe some of the physical security best practices.
Question
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.

A)worm
B)rootkit
C)backdoor
D)malware
Question
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
Question
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
Question
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
Question
Attackers who drive around looking for wireless LANs to intercept are called ____.

A)Trojans
B)worms
C)packet sniffers
D)wardrivers
Question
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.

A)gateway
B)IDS
C)firewall
D)router
Question
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.

A)worm
B)rootkit
C)backdoor
D)malware
Question
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.

A)worm
B)rootkit
C)backdoor
D)Trojan
Question
Match between columns
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
encryption
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
penetration tester
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
cracker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
hacker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
MAC filtering
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
ping scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
port scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
Whois
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
encryption
term used sometimes by white hats for their consulting services
penetration tester
term used sometimes by white hats for their consulting services
cracker
term used sometimes by white hats for their consulting services
hacker
term used sometimes by white hats for their consulting services
MAC filtering
term used sometimes by white hats for their consulting services
ping scanner
term used sometimes by white hats for their consulting services
port scanner
term used sometimes by white hats for their consulting services
Whois
term used sometimes by white hats for their consulting services
protocol analyzer
handy utility for discovering information about an Internet domain
encryption
handy utility for discovering information about an Internet domain
penetration tester
handy utility for discovering information about an Internet domain
cracker
handy utility for discovering information about an Internet domain
hacker
handy utility for discovering information about an Internet domain
MAC filtering
handy utility for discovering information about an Internet domain
ping scanner
handy utility for discovering information about an Internet domain
port scanner
handy utility for discovering information about an Internet domain
Whois
handy utility for discovering information about an Internet domain
protocol analyzer
security feature used on some wireless access points
encryption
security feature used on some wireless access points
penetration tester
security feature used on some wireless access points
cracker
security feature used on some wireless access points
hacker
security feature used on some wireless access points
MAC filtering
security feature used on some wireless access points
ping scanner
security feature used on some wireless access points
port scanner
security feature used on some wireless access points
Whois
security feature used on some wireless access points
protocol analyzer
automated method for pinging a range of IP addresses
encryption
automated method for pinging a range of IP addresses
penetration tester
automated method for pinging a range of IP addresses
cracker
automated method for pinging a range of IP addresses
hacker
automated method for pinging a range of IP addresses
MAC filtering
automated method for pinging a range of IP addresses
ping scanner
automated method for pinging a range of IP addresses
port scanner
automated method for pinging a range of IP addresses
Whois
automated method for pinging a range of IP addresses
protocol analyzer
determines which TCP and UDP ports are available on a particular computer or device
encryption
determines which TCP and UDP ports are available on a particular computer or device
penetration tester
determines which TCP and UDP ports are available on a particular computer or device
cracker
determines which TCP and UDP ports are available on a particular computer or device
hacker
determines which TCP and UDP ports are available on a particular computer or device
MAC filtering
determines which TCP and UDP ports are available on a particular computer or device
ping scanner
determines which TCP and UDP ports are available on a particular computer or device
port scanner
determines which TCP and UDP ports are available on a particular computer or device
Whois
determines which TCP and UDP ports are available on a particular computer or device
protocol analyzer
allows you to capture packets and determine which protocols services are running
encryption
allows you to capture packets and determine which protocols services are running
penetration tester
allows you to capture packets and determine which protocols services are running
cracker
allows you to capture packets and determine which protocols services are running
hacker
allows you to capture packets and determine which protocols services are running
MAC filtering
allows you to capture packets and determine which protocols services are running
ping scanner
allows you to capture packets and determine which protocols services are running
port scanner
allows you to capture packets and determine which protocols services are running
Whois
allows you to capture packets and determine which protocols services are running
protocol analyzer
sometimes a derogatory term to describe an unskilled or undisciplined programmer
encryption
sometimes a derogatory term to describe an unskilled or undisciplined programmer
penetration tester
sometimes a derogatory term to describe an unskilled or undisciplined programmer
cracker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
hacker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
MAC filtering
sometimes a derogatory term to describe an unskilled or undisciplined programmer
ping scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
port scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
Whois
sometimes a derogatory term to describe an unskilled or undisciplined programmer
protocol analyzer
used to safeguard data as it travels across the Internet and even within the company network
encryption
used to safeguard data as it travels across the Internet and even within the company network
penetration tester
used to safeguard data as it travels across the Internet and even within the company network
cracker
used to safeguard data as it travels across the Internet and even within the company network
hacker
used to safeguard data as it travels across the Internet and even within the company network
MAC filtering
used to safeguard data as it travels across the Internet and even within the company network
ping scanner
used to safeguard data as it travels across the Internet and even within the company network
port scanner
used to safeguard data as it travels across the Internet and even within the company network
Whois
used to safeguard data as it travels across the Internet and even within the company network
protocol analyzer
Question
What is a hoax virus?
Question
How can you use NAT to improve security?
Question
What is the 802.11i standard?
Question
What are the rules or guidelines for creating secure passwords?
Question
What are the benefits of using VPNs?
Question
How can you create VPNs in a Windows environment?
Question
Can you use a firewall as a router? Explain.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Introduction to Network Security
1
____ is the standard software service on many Linux distributions for authenticating users.

A)Password Policy
B)Shadow
C)MMC
D)PAM
D
2
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
False
3
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.

A)PPTP
B)L2TP
C)PPP
D)SLIP
B
4
____ allows administrators to control who has access to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
____ allows administrators to control what users can do after they are logged on to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.

A)password
B)passwd
C)shadow
D)pwd
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.

A)sharing
B)NTFS
C)folder
D)access
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.

A)Digital
B)Kerberos
C)PAM
D)VPN
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
A VPN is limited to dial-up connections.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).

A)PPTP
B)IDS
C)PPP
D)SLIP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.

A)IDS
B)VPN
C)rootkit
D)packet sniffer
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
IPSec works by establishing a(n)____ between two communicating devices.

A)circuit
B)channel
C)association
D)tunnel
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.

A)gpg
B)efs
C)ipsec
D)tar
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.

A)IDSs
B)RRASs
C)Firewalls
D)VPNs
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.

A)SSL
B)VPN
C)IPSec
D)SSH
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.

A)sharing
B)NTFS
C)folder
D)access
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Spam is simply unsolicited e-mail.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
What are the basic guidelines that a network security policy should follow?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.

A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
What are the elements of a security policy? Briefly describe each.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a program that spreads by replicating itself into other programs or documents.

A)worm
B)virus
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.

A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
What is a highly restrictive security policy?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.

A)spoofed address
B)ping flood
C)IDS
D)DoS
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
Digital certificates involve a third party called a(n)_________________________ (CA).
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
Describe some of the physical security best practices.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.

A)worm
B)rootkit
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Attackers who drive around looking for wireless LANs to intercept are called ____.

A)Trojans
B)worms
C)packet sniffers
D)wardrivers
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.

A)gateway
B)IDS
C)firewall
D)router
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.

A)worm
B)rootkit
C)backdoor
D)malware
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.

A)worm
B)rootkit
C)backdoor
D)Trojan
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
encryption
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
penetration tester
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
cracker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
hacker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
MAC filtering
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
ping scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
port scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
Whois
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
encryption
term used sometimes by white hats for their consulting services
penetration tester
term used sometimes by white hats for their consulting services
cracker
term used sometimes by white hats for their consulting services
hacker
term used sometimes by white hats for their consulting services
MAC filtering
term used sometimes by white hats for their consulting services
ping scanner
term used sometimes by white hats for their consulting services
port scanner
term used sometimes by white hats for their consulting services
Whois
term used sometimes by white hats for their consulting services
protocol analyzer
handy utility for discovering information about an Internet domain
encryption
handy utility for discovering information about an Internet domain
penetration tester
handy utility for discovering information about an Internet domain
cracker
handy utility for discovering information about an Internet domain
hacker
handy utility for discovering information about an Internet domain
MAC filtering
handy utility for discovering information about an Internet domain
ping scanner
handy utility for discovering information about an Internet domain
port scanner
handy utility for discovering information about an Internet domain
Whois
handy utility for discovering information about an Internet domain
protocol analyzer
security feature used on some wireless access points
encryption
security feature used on some wireless access points
penetration tester
security feature used on some wireless access points
cracker
security feature used on some wireless access points
hacker
security feature used on some wireless access points
MAC filtering
security feature used on some wireless access points
ping scanner
security feature used on some wireless access points
port scanner
security feature used on some wireless access points
Whois
security feature used on some wireless access points
protocol analyzer
automated method for pinging a range of IP addresses
encryption
automated method for pinging a range of IP addresses
penetration tester
automated method for pinging a range of IP addresses
cracker
automated method for pinging a range of IP addresses
hacker
automated method for pinging a range of IP addresses
MAC filtering
automated method for pinging a range of IP addresses
ping scanner
automated method for pinging a range of IP addresses
port scanner
automated method for pinging a range of IP addresses
Whois
automated method for pinging a range of IP addresses
protocol analyzer
determines which TCP and UDP ports are available on a particular computer or device
encryption
determines which TCP and UDP ports are available on a particular computer or device
penetration tester
determines which TCP and UDP ports are available on a particular computer or device
cracker
determines which TCP and UDP ports are available on a particular computer or device
hacker
determines which TCP and UDP ports are available on a particular computer or device
MAC filtering
determines which TCP and UDP ports are available on a particular computer or device
ping scanner
determines which TCP and UDP ports are available on a particular computer or device
port scanner
determines which TCP and UDP ports are available on a particular computer or device
Whois
determines which TCP and UDP ports are available on a particular computer or device
protocol analyzer
allows you to capture packets and determine which protocols services are running
encryption
allows you to capture packets and determine which protocols services are running
penetration tester
allows you to capture packets and determine which protocols services are running
cracker
allows you to capture packets and determine which protocols services are running
hacker
allows you to capture packets and determine which protocols services are running
MAC filtering
allows you to capture packets and determine which protocols services are running
ping scanner
allows you to capture packets and determine which protocols services are running
port scanner
allows you to capture packets and determine which protocols services are running
Whois
allows you to capture packets and determine which protocols services are running
protocol analyzer
sometimes a derogatory term to describe an unskilled or undisciplined programmer
encryption
sometimes a derogatory term to describe an unskilled or undisciplined programmer
penetration tester
sometimes a derogatory term to describe an unskilled or undisciplined programmer
cracker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
hacker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
MAC filtering
sometimes a derogatory term to describe an unskilled or undisciplined programmer
ping scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
port scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
Whois
sometimes a derogatory term to describe an unskilled or undisciplined programmer
protocol analyzer
used to safeguard data as it travels across the Internet and even within the company network
encryption
used to safeguard data as it travels across the Internet and even within the company network
penetration tester
used to safeguard data as it travels across the Internet and even within the company network
cracker
used to safeguard data as it travels across the Internet and even within the company network
hacker
used to safeguard data as it travels across the Internet and even within the company network
MAC filtering
used to safeguard data as it travels across the Internet and even within the company network
ping scanner
used to safeguard data as it travels across the Internet and even within the company network
port scanner
used to safeguard data as it travels across the Internet and even within the company network
Whois
used to safeguard data as it travels across the Internet and even within the company network
protocol analyzer
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
What is a hoax virus?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
How can you use NAT to improve security?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
What is the 802.11i standard?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
What are the rules or guidelines for creating secure passwords?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
What are the benefits of using VPNs?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
How can you create VPNs in a Windows environment?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
Can you use a firewall as a router? Explain.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 48 flashcards in this deck.