IS5403 HP Questions

dware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator

Drag the words into the correct boxes

  Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware :pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Keyloggers: log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus :  malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm:  Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse:  a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot:  computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.

Accesses the internet on behalf of internal network clients

PROXY SERVER

Monitors network activity for suspicious traffic and potentially performs mitigation tasks

INTRUSION PROTECTION SYSTEM

Validation of who is logging on

AUTHENTICATION

Mitigation of vulnerabilities

PATCHING 

Monitors network activity for suspicious traffic

 INTRUSION DETECTION SYSTEM

Detects bad software on End points

ANTI MALWARE

Connects external clients like they are an internal client

VIRTUAL PRIVATE NETWORK

Validation of access to restricted network locations

AUTHORIZATION

FWs check packets with this

STATEFUL INSPECTION

Non-technical controls are called

 PHYSICAL AND ADMINISTRATIVE

Layered Defense

DEFENSE IN DEPTH

Checks email threats

EMAIL  SCANNER

Blocks Ports and Protocols

 FIREWALLS

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *