- Drag the network threat on the left to the definition on the right
Data manipulation changing data for personal gain
Disruption of service overloading a server to reduce its performance
Information theft stealing data on a hard drive to gain a competitive advantage
Identity theft stealing information to impersonate someone and usually obtain credit
- How does a phisher typically contact a victim?
- A file is downloaded from the Internet. After the user opens the downloaded file, the user’s hard drive crashes and all information on the computer is lost. What type of attack occurred?
- In rapid succession, an intruder tries a large number of possibilities to guess passwords. As a result, other users on the network are locked out. What type of attack occurred?
- What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
- A network administrator is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly. What is the best action for the administrator to take?
- Drag the term on the left to the best description on the right
Stateful packet inspection Can look inside the packet up through layer 7
Website filtering allows or denies access based on a URL
Simple packet filtering allows or denies access based on an IP or MAC address
NAT keeps external users from knowing the IP address used inside the network
- Drag the term on the left to the definition on the right
Integrated firewall a feature of a network device such as a router
Personal firewall an application designed to protect a home PC
Appliance-based firewall a device that has the sole function of being a firewall
Server-based firewall an application designed to protect the enterprise network
- What are three security features commonly found on an ISR? (Choose three)
- What are two purpose of a DMZ (Choose two)
To create a network area that allows internal resources, such as a web server, to be accessed by external users
To establish a network area where network resources can be shared by both internal and external users
0 komentar:
Posting Komentar