• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

What do hackers use to probe, scan, and then capture data on a strategically chosen computer?

Rootkit

What is the process of sending packets with a fake source address?

Spoofing

What is the simplest method of preventing brute force attacks?

Automatically locking user accounts after a certain amount of failed login attempts.

What is the hardest hacker method to mitigate?

Social Engineering

What are the three main ways to detect an intruder and defend against it?

-Active Detection (Constantly scanning the network for possible break ins)


-Passive Detection (Logging all network events to a file.)



-Proactive Defense (Using tools to fortify your network against attack.)

What do you call the good practice of making sure there aren't sensitive information left out in the open for anyone to see.

Clean-Desk Policy

What do you call an internal or contracted thorough examination of a network and its security policies to to verify they are secure?

Security Audit

Given that a person is a packet, the crowds on Black Friday are a good way to describe what kind of attack?

Denial of Service (DoS)

What kind of threat targets files with a .com, .exe, and .dll extension?

File virus.

Which variation of wireless encryption is not only insecure but could even raise your chances of being targeted by an attack by using it?

WEP

What threat can activate, propagate, and destroy all on its own?

Worm

What kind of attack is performed by an actual hacker, as opposed to a virus that is blindly replicated from user to user?

Directed attack.

What two components do most typical antivirus programs consist of?

-The engine.


-The definition files.

What kind of scanning allows an antivirus program to search for a virus even if it doesn't have a definition for it yet?

Heuristic scanning.

What tool is used to intercept network traffic for troubleshooting or malicious purposes?

Packet sniffer.