Short Answer
Match each item with a statement below.
a.threat
b.remote logon service
c.PING sweep
d.computer forensics
e.port scanner
f.handler
g.session hijacking
h.security policy
i.honeypot
-a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Which of the following terms means restricting
Q2: Which of the following is a specially
Q3: Which type of attack includes SYN Flood,
Q4: Match each item with a statement below.<br>a.threat<br>b.remote
Q6: A(n) _ consists of creating hashed values
Q7: Which of the following types of attacks
Q8: Proxy server software permits internal network addresses
Q9: Which of the following reveals a system
Q10: Strictly speaking, VPNs use tunneling protocols; therefore,
Q11: Which of the following is an area