Deck 11: Securing Your Network

Full screen (f)
exit full mode
Question
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
Use Space or
up arrow
down arrow
to flip the card.
Question
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.

A)SSL
B)TLS
C)IPSec
D)RSA
Question
Application level gateways are restricted to a single level of filtering.
Question
You can configure Windows Firewall for any network connection.
Question
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

A)source
B)destination
C)fast
D)designated
Question
Virtual private networks (VPNs)can be set up to provide secure remote communications.
Question
On the sending computer using IPSec, the data is encrypted at the ____ layer.

A)Transport
B)Presentation
C)Session
D)Application
Question
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?

A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
Question
Stateless filtering screens on the basis of the context of the communication.
Question
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
Question
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.

A)remote procedure call
B)virus
C)error handler
D)hoax
Question
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
Question
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)router
C)switch
D)hub
Question
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
Question
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
Question
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.

A)war
B)battle
C)spy
D)surveillance
Question
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.

A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
Question
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.

A)Social
B)Psychological
C)Interpersonal
D)Communications
Question
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.

A)attributes()
B)standards()
C)encrypt()
D)setkey()
Question
The Trojan horse named ____ is designed to give the attacker the target's user account and password.

A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
Question
Identify five border points that the strongest border security is designed to protect.
Question
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
Question
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
Question
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
Question
____ storage is employed by a computer system to house frequently used data for quick access.

A)RAM
B)Register
C)Cache
D)CD-ROM
Question
To ensure that the IPTables service starts automatically each time you boot the operating system, use the ____ command.

A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
Question
The NAT setup offers addresses in the ____ range as the default option.

A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
Question
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
Question
What are the main elements involved in a wireless network attack?
Question
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
Question
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
Question
Provide a description of service packs.
Question
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
Question
Identify four tasks that can be fulfilled by a proxy server.
Question
Identify four network hardening techniques.
Question
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.

A)21
B)23
C)80
D)119
Question
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
Question
How does a source routing attack work?
Question
How does a buffer attack work?
Question
What are the advantages of using Network Address Translation (NAT)?
Question
Match between columns
command line interface that enables you to configure packet filter rules through the use of tables.
digital certificate
command line interface that enables you to configure packet filter rules through the use of tables.
National Security Institute (NSI)
command line interface that enables you to configure packet filter rules through the use of tables.
worm
command line interface that enables you to configure packet filter rules through the use of tables.
remote denial of service (DoS)attack
command line interface that enables you to configure packet filter rules through the use of tables.
spyware
command line interface that enables you to configure packet filter rules through the use of tables.
sniffer software
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
command line interface that enables you to configure packet filter rules through the use of tables.
access control list (ACL)
command line interface that enables you to configure packet filter rules through the use of tables.
Security Level Configuration
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
might take the form of simply flooding a system with more packets than it can handle.
National Security Institute (NSI)
might take the form of simply flooding a system with more packets than it can handle.
worm
might take the form of simply flooding a system with more packets than it can handle.
remote denial of service (DoS)attack
might take the form of simply flooding a system with more packets than it can handle.
spyware
might take the form of simply flooding a system with more packets than it can handle.
sniffer software
might take the form of simply flooding a system with more packets than it can handle.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
access control list (ACL)
might take the form of simply flooding a system with more packets than it can handle.
Security Level Configuration
used between network computers to verify the authenticity of the communication.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
used between network computers to verify the authenticity of the communication.
worm
used between network computers to verify the authenticity of the communication.
remote denial of service (DoS)attack
used between network computers to verify the authenticity of the communication.
spyware
used between network computers to verify the authenticity of the communication.
sniffer software
used between network computers to verify the authenticity of the communication.
IPTables
used between network computers to verify the authenticity of the communication.
access control list (ACL)
used between network computers to verify the authenticity of the communication.
Security Level Configuration
tool that may be used to designate a trusted device.
digital certificate
tool that may be used to designate a trusted device.
National Security Institute (NSI)
tool that may be used to designate a trusted device.
worm
tool that may be used to designate a trusted device.
remote denial of service (DoS)attack
tool that may be used to designate a trusted device.
spyware
tool that may be used to designate a trusted device.
sniffer software
tool that may be used to designate a trusted device.
IPTables
tool that may be used to designate a trusted device.
access control list (ACL)
tool that may be used to designate a trusted device.
Security Level Configuration
used by attackers to associate IP address information with account and password communications.
digital certificate
used by attackers to associate IP address information with account and password communications.
National Security Institute (NSI)
used by attackers to associate IP address information with account and password communications.
worm
used by attackers to associate IP address information with account and password communications.
remote denial of service (DoS)attack
used by attackers to associate IP address information with account and password communications.
spyware
used by attackers to associate IP address information with account and password communications.
sniffer software
used by attackers to associate IP address information with account and password communications.
IPTables
used by attackers to associate IP address information with account and password communications.
access control list (ACL)
used by attackers to associate IP address information with account and password communications.
Security Level Configuration
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
digital certificate
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
National Security Institute (NSI)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
worm
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
remote denial of service (DoS)attack
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
spyware
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
sniffer software
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
IPTables
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
access control list (ACL)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
Security Level Configuration
a list of permit and deny conditions that can be associated with a particular router interface.
digital certificate
a list of permit and deny conditions that can be associated with a particular router interface.
National Security Institute (NSI)
a list of permit and deny conditions that can be associated with a particular router interface.
worm
a list of permit and deny conditions that can be associated with a particular router interface.
remote denial of service (DoS)attack
a list of permit and deny conditions that can be associated with a particular router interface.
spyware
a list of permit and deny conditions that can be associated with a particular router interface.
sniffer software
a list of permit and deny conditions that can be associated with a particular router interface.
IPTables
a list of permit and deny conditions that can be associated with a particular router interface.
access control list (ACL)
a list of permit and deny conditions that can be associated with a particular router interface.
Security Level Configuration
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
digital certificate
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
National Security Institute (NSI)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
worm
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
remote denial of service (DoS)attack
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
spyware
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
sniffer software
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
IPTables
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
access control list (ACL)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
Security Level Configuration
provides information about all kinds of security threats.
digital certificate
provides information about all kinds of security threats.
National Security Institute (NSI)
provides information about all kinds of security threats.
worm
provides information about all kinds of security threats.
remote denial of service (DoS)attack
provides information about all kinds of security threats.
spyware
provides information about all kinds of security threats.
sniffer software
provides information about all kinds of security threats.
IPTables
provides information about all kinds of security threats.
access control list (ACL)
provides information about all kinds of security threats.
Security Level Configuration
Question
Provide a general description for how routers are used in border security.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Securing Your Network
1
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
D
2
____ goes to the source of the TCP/IP communications by securing IP in its Network layer, or Layer 3.

A)SSL
B)TLS
C)IPSec
D)RSA
C
3
Application level gateways are restricted to a single level of filtering.
False
4
You can configure Windows Firewall for any network connection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
In ____ routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

A)source
B)destination
C)fast
D)designated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Virtual private networks (VPNs)can be set up to provide secure remote communications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
On the sending computer using IPSec, the data is encrypted at the ____ layer.

A)Transport
B)Presentation
C)Session
D)Application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?

A)American Society for Industrial Security (ASIS)
B)InfraGard
C)Information Systems Security Association (ISSA)
D)Information Security Forum (ISF)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Stateless filtering screens on the basis of the context of the communication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.

A)remote procedure call
B)virus
C)error handler
D)hoax
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is unrequested e-mail that is sent to hundreds, thousands, or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)router
C)switch
D)hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.

A)war
B)battle
C)spy
D)surveillance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.

A)magnetic disks
B)registers
C)buffers
D)CD-ROMs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.

A)Social
B)Psychological
C)Interpersonal
D)Communications
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
On a UNIX/Linux system, IPSec can be configured using the ____ function with the spdadd instruction in a shell script.

A)attributes()
B)standards()
C)encrypt()
D)setkey()
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The Trojan horse named ____ is designed to give the attacker the target's user account and password.

A)NetBus
B)Backdoor.IRC
C)Yoink
D)Trojan.Idly
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Identify five border points that the strongest border security is designed to protect.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Identify five Microsoft Routing and Remote Access Services that enable or manage remote access to Windows Server 2003.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ storage is employed by a computer system to house frequently used data for quick access.

A)RAM
B)Register
C)Cache
D)CD-ROM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
To ensure that the IPTables service starts automatically each time you boot the operating system, use the ____ command.

A)service iptables start
B)chkconfig --level 345 iptables on
C)chkconfig ipchains off
D)/sbin/service iptables save
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The NAT setup offers addresses in the ____ range as the default option.

A)10.0.0.0
B)172.16.0.0
C)192.168.0.0
D)224.0.0.0
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the main elements involved in a wireless network attack?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
A set of filtering rules, called a ____, is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Provide a description of service packs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Identify four tasks that can be fulfilled by a proxy server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Identify four network hardening techniques.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
If you want to block access to Telnet using a firewall, then consider blocking TCP/UDP port ____.

A)21
B)23
C)80
D)119
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How does a source routing attack work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
How does a buffer attack work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the advantages of using Network Address Translation (NAT)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
command line interface that enables you to configure packet filter rules through the use of tables.
digital certificate
command line interface that enables you to configure packet filter rules through the use of tables.
National Security Institute (NSI)
command line interface that enables you to configure packet filter rules through the use of tables.
worm
command line interface that enables you to configure packet filter rules through the use of tables.
remote denial of service (DoS)attack
command line interface that enables you to configure packet filter rules through the use of tables.
spyware
command line interface that enables you to configure packet filter rules through the use of tables.
sniffer software
command line interface that enables you to configure packet filter rules through the use of tables.
IPTables
command line interface that enables you to configure packet filter rules through the use of tables.
access control list (ACL)
command line interface that enables you to configure packet filter rules through the use of tables.
Security Level Configuration
might take the form of simply flooding a system with more packets than it can handle.
digital certificate
might take the form of simply flooding a system with more packets than it can handle.
National Security Institute (NSI)
might take the form of simply flooding a system with more packets than it can handle.
worm
might take the form of simply flooding a system with more packets than it can handle.
remote denial of service (DoS)attack
might take the form of simply flooding a system with more packets than it can handle.
spyware
might take the form of simply flooding a system with more packets than it can handle.
sniffer software
might take the form of simply flooding a system with more packets than it can handle.
IPTables
might take the form of simply flooding a system with more packets than it can handle.
access control list (ACL)
might take the form of simply flooding a system with more packets than it can handle.
Security Level Configuration
used between network computers to verify the authenticity of the communication.
digital certificate
used between network computers to verify the authenticity of the communication.
National Security Institute (NSI)
used between network computers to verify the authenticity of the communication.
worm
used between network computers to verify the authenticity of the communication.
remote denial of service (DoS)attack
used between network computers to verify the authenticity of the communication.
spyware
used between network computers to verify the authenticity of the communication.
sniffer software
used between network computers to verify the authenticity of the communication.
IPTables
used between network computers to verify the authenticity of the communication.
access control list (ACL)
used between network computers to verify the authenticity of the communication.
Security Level Configuration
tool that may be used to designate a trusted device.
digital certificate
tool that may be used to designate a trusted device.
National Security Institute (NSI)
tool that may be used to designate a trusted device.
worm
tool that may be used to designate a trusted device.
remote denial of service (DoS)attack
tool that may be used to designate a trusted device.
spyware
tool that may be used to designate a trusted device.
sniffer software
tool that may be used to designate a trusted device.
IPTables
tool that may be used to designate a trusted device.
access control list (ACL)
tool that may be used to designate a trusted device.
Security Level Configuration
used by attackers to associate IP address information with account and password communications.
digital certificate
used by attackers to associate IP address information with account and password communications.
National Security Institute (NSI)
used by attackers to associate IP address information with account and password communications.
worm
used by attackers to associate IP address information with account and password communications.
remote denial of service (DoS)attack
used by attackers to associate IP address information with account and password communications.
spyware
used by attackers to associate IP address information with account and password communications.
sniffer software
used by attackers to associate IP address information with account and password communications.
IPTables
used by attackers to associate IP address information with account and password communications.
access control list (ACL)
used by attackers to associate IP address information with account and password communications.
Security Level Configuration
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
digital certificate
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
National Security Institute (NSI)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
worm
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
remote denial of service (DoS)attack
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
spyware
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
sniffer software
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
IPTables
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
access control list (ACL)
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
Security Level Configuration
a list of permit and deny conditions that can be associated with a particular router interface.
digital certificate
a list of permit and deny conditions that can be associated with a particular router interface.
National Security Institute (NSI)
a list of permit and deny conditions that can be associated with a particular router interface.
worm
a list of permit and deny conditions that can be associated with a particular router interface.
remote denial of service (DoS)attack
a list of permit and deny conditions that can be associated with a particular router interface.
spyware
a list of permit and deny conditions that can be associated with a particular router interface.
sniffer software
a list of permit and deny conditions that can be associated with a particular router interface.
IPTables
a list of permit and deny conditions that can be associated with a particular router interface.
access control list (ACL)
a list of permit and deny conditions that can be associated with a particular router interface.
Security Level Configuration
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
digital certificate
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
National Security Institute (NSI)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
worm
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
remote denial of service (DoS)attack
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
spyware
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
sniffer software
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
IPTables
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
access control list (ACL)
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
Security Level Configuration
provides information about all kinds of security threats.
digital certificate
provides information about all kinds of security threats.
National Security Institute (NSI)
provides information about all kinds of security threats.
worm
provides information about all kinds of security threats.
remote denial of service (DoS)attack
provides information about all kinds of security threats.
spyware
provides information about all kinds of security threats.
sniffer software
provides information about all kinds of security threats.
IPTables
provides information about all kinds of security threats.
access control list (ACL)
provides information about all kinds of security threats.
Security Level Configuration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Provide a general description for how routers are used in border security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.