BG_deck_4637598 Flashcards Preview

Night 801 > BG_deck_4637598 > Flashcards

Flashcards in BG_deck_4637598 Deck (25):
1

A proxy firewall typically uses what?P805

Two network interface cards(NICs).

2

This type of firewall is referred to as a ---- ----- firewall?p805

Daul-homed

3

The proxy software manages the connections between the two ---?P805

NICs

4

A ----- ------ firewall segregating two networks from each other are?P805

daul-homed

5

The proxy function can occur at either the ----- ---- or the ---- ----?P805

application level.circuit level

6

What is application level proxy?P805

It reads the function of the individual commands of the protocols that are being served.

7

UDP is?P806

User data protocol.

8

ICMP is?P806

Internet control message protocol

9

DOS is?P806

Denial of service.

10

DDoS is?P806

Distributed denial of service

11

ICMP is?P806

broadcasting ping

12

What is antispyware?P806

It is software that seeks out and stops viruses from entering and spreading in your system.

13

Ensure that the most secure form of --------- -------- is used and supported by both the client and the authentication servers?p806

Authentication encryption

14

Use encrypted --- and ----- whenever possible,even for internal communications?p806

software,protocols

15

Require users to change their ----- according to the company's password policy?P807

Password

16

Instruct users to never write their ------ down.P807

password

17

Tell users share their ----- or ---- session with another person?P807

password,logon

18

Users should ---- -- any personal data onto verified removable media?P807

back up

19

Require users to employ a ------- ------- screensaver?P807

password protected

20

During the first release of STAR WARS two of the most popular passwords used on collage campuses were ------ and-----P?807

C3PO, R2D2

21

The most effective method of preventing viruses,spyware,and harm to data is ---------?p808

EDUCATION

22

What are two common security threats?P808

your social engineering and malware

23

What is social engineering?P209

It is a process in witch an attacker attempts to acquire information about network and system by social means,such as talking to people in the organization.

24

When a attempt is made to acquire access information such as passwords through email or instant messaging, this is known as ----------?P809

phishing.

25

Y/N. Do you let users use the auto-logon features?P807

no