Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
What do hackers use to probe, scan, and then capture data on a strategically chosen computer? |
Rootkit |
|
What is the process of sending packets with a fake source address? |
Spoofing |
|
What is the simplest method of preventing brute force attacks? |
Automatically locking user accounts after a certain amount of failed login attempts. |
|
What is the hardest hacker method to mitigate? |
Social Engineering |
|
What are the three main ways to detect an intruder and defend against it? |
-Active Detection (Constantly scanning the network for possible break ins) -Passive Detection (Logging all network events to a file.)
-Proactive Defense (Using tools to fortify your network against attack.) |
|
What do you call the good practice of making sure there aren't sensitive information left out in the open for anyone to see. |
Clean-Desk Policy |
|
What do you call an internal or contracted thorough examination of a network and its security policies to to verify they are secure? |
Security Audit |
|
Given that a person is a packet, the crowds on Black Friday are a good way to describe what kind of attack? |
Denial of Service (DoS) |
|
What kind of threat targets files with a .com, .exe, and .dll extension? |
File virus. |
|
Which variation of wireless encryption is not only insecure but could even raise your chances of being targeted by an attack by using it? |
WEP |
|
What threat can activate, propagate, and destroy all on its own? |
Worm |
|
What kind of attack is performed by an actual hacker, as opposed to a virus that is blindly replicated from user to user? |
Directed attack. |
|
What two components do most typical antivirus programs consist of? |
-The engine. -The definition files. |
|
What kind of scanning allows an antivirus program to search for a virus even if it doesn't have a definition for it yet? |
Heuristic scanning. |
|
What tool is used to intercept network traffic for troubleshooting or malicious purposes? |
Packet sniffer. |