Matching
Match each term with the correct statement below.
Premises:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Responses:
protocol analyzer
hacker
port scanner
MAC filtering
encryption
cracker
penetration tester
ping scanner
Whois
Correct Answer:
Premises:
Responses:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Premises:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Responses:
Related Questions
Q5: What is the 802.11i standard?
Q6: Spam is simply unsolicited e-mail.
Q7: On Linux systems, a simple method to
Q8: What are the rules or guidelines for
Q9: IPSec works by establishing a(n)_ between two
Q11: _ allows administrators to control what users
Q12: A _ is a program installed on
Q13: What is a hoax virus?
Q14: A hardware firewall is configured with two
Q15: Viruses, worms, and rootkits are part of