Intrusion Threats
Anti-exploit Software
Netstat
Firewalls
100

Name 3 (or more) intrusion threats

living off the land
multi-routing
buffer overwriting
covert CGI scripts
protocol-specific attacks

100

Freebie.....X2

Freebie.....X2

100

What words does it consist of NETSTAT

NETwork STATistics

100

What is Firewalls

firewall is a security device (computer hardware or software) that can help protect your network by filtering traffic and blocking unauthorized access by unauthorized persons to personal data on your computer.

200

What do intruders use when hacking networks?

existing tools and processes and stolen credentials

200

What is  capable of malwarebytes Anti-Exploit?

malwarebytes Anti-Exploit program is capable of detecting bugs on your personal computer from vulnerabilities

200

Skipping a move

:(((((

200

How does it work?

A firewall acts as a barrier or filter between your computer and another network, such as the Internet.

300

antibonus: cancellation of points

:((((((
300

What is the underlying technology Avira blocking?

It core technology will block any online threats including malicious websites, ransomware, and spyware

300

What data can provide us with netstat?

1)The name of the protocol that uses the port.
2)Local IP address and computer name and port number used.
3)The IP address and port number to which we are connecting.
4)TCP connection status

300

Types of firewalls

Packet-Filtering Firewalls

Circuit-Level Gateways

Stateful Inspection Firewalls

Proxy Firewalls

Next-Generation Firewalls

Cloud Firewalls

400

What is the ESET Internet security?

legendary antivirus trusted by millions of users worldwide

400

What does avast do besides protecting your computer from viruses?

it will check each website you visit and warn you if it is unsafe of if it simply has a bed reputation

400

Digital devices use communication ports for all kinds of tasks, such as...

1)connecting to networks

2)sending and receiving email

3)exchanging data with peripheral devices

4)accessing the Web.

400

Bonus: +100 and the right to choose one more question

:))))))
500

What protocols do you know?

ARP, IP, TCP, UDP, ICMP

500

Which applications protects Malwarebytes Anti-Exploit program?

it shields applications such as Microsoft Office, VLC Media Player, Adobe PDF Reader, and many more

500

BONUS +500

BONUS +500

500

Advantages and Disadvantages of Next-Generation Firewalls

Advantages:

•It has deep inspection, antivirus, spam filtering, application controls

•Automatic updates

•Network traffic monitoring from Layer 2 to Layer 7 of OSI model

Disadvantages:

•Highly priced

•Additional configuration required for integration with security management solutions