IS3445 CHAP 5 MITIGATING RISK WHEN CONNECTING TO THE INTERNET Flashcards

1
Q

___ is any software application where advertising banners are displayed while the program is running.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is an agreement that outlines what can and cannot be done with the personal data of visitors to a Web site.

A

Client privacy agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is a cybercriminal intending harm to systems and networks.

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is constant and unwelcome electronic tracking of another person.

A

Cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is an organized, hierarchical division of DNS names.

A

DNS namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is a hierarchical system for naming resources on a network as well as providing translation between the resource’s IP address and its domain name.

A

(DNS) Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is the process of identifying potentially risky email and stopping it from reaching the end user.

A

Email filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is assuming the online identity of a person.

A

Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is a security mechanism that monitors data packets traveling across a network, comparing traffic against parameters of known threats. It is a passive security measure in that it only monitors the network and odes’t take steps to mitigate the risk.

A

(IDS) Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a security mechanism that monitors and reacts to data packets traveling across a network. It is an active security measure because it not only monitors but also blocks suspect traffic identified by the device.

A

(IPS) Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is designed to infect, corrupt, and damage Microsoft Office documents.

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is an illegitimate announcement of new malware.

A

Malware hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a form of malware that covertly gathers system information through the user’s Internet connection without his or her knowledge.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Worms are able to self-replicate.

TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. You have created a Web site and need to increase visitor trust. Which of the following methods are used to build trust? Select two.
  2. Logos
  3. Testimonials
  4. Color choice
  5. Font size
A

Logos

Testimonials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. IDS and IPS systems are a replacement for a firewall system.
    TRUE OR FALSE
A

FALSE

17
Q
  1. which of the following attack types is based on faking the real source of a transmission, file or email?
  2. Backdoor
  3. DDoS
  4. Spoofing
  5. Front door
A

Spoofing

18
Q
  1. To increase network security, you have decided to block port 21. Which of the following services is associated with port 21?
  2. FTP
  3. HTTPS
  4. DNS
  5. SFTP
A

FTP

19
Q
  1. A(n) ___ is a passive network monitoring and security system.
A

Intrusion detection system or IDS

20
Q
  1. Servers within the DMS it outside of the local network.

TRUE OR FALSE.

A

TRUE

21
Q
  1. Port ___ is used by the HTTP protocol.
A

80

22
Q
  1. A ___ sits between the Internet and the client systems responding to client requests for Web pages.
A

Proxy server

23
Q
  1. Which of the following best describes the function of the DNS server?
  2. Uses Media Access Control addresses to locate network systems
  3. Provides host name-to-IP resolution
  4. Provides IP name resolution
  5. encrypts host names
A

Provides host name-to-IP resolution

24
Q
  1. A DoS attack is designed to overwhelm a particular resource making it unavailable.
    TRUE OR FALSE
A

TRUE