Security
Misc
Threats
802 dot
Zones
100
Term that describes a value that is calculated by applying a mathematical formula to data
What is a checksum
100
refers to digging useful information out of an organization’s trash bin.
What is dumpster diving
100
Programs that replicate themselves over the network without a user’s intervention.
What are worms
100
Operates at 5GHz with 54Mbps capacity
What is 802.11a
100
Which security zone is the organization’s private network; fully controlled by the company, and trusted
What is intranet
200
Built-in anti-spyware software included with Windows Vista and Windows Server 2008
What is Microsoft Defender
200
3 pillars of network security: Integrity, available, _______________
What is confidentiality
200
These appear to be harmless programs, however, they are delivery vehicles for destructive code.
What is logic bomb/Trojan horse
200
Designed to run in countries outside the U.S.?
What is 802.11d
200
An area between the private network and public network
What is DMZ
300
Shoulder surfing is an example
What is social engineering
300
TCP connection is created by this
What is three way handshake
300
Overwhelms a host by flooding it with ICMP packets.
What is smurf attack
300
Authentication framework for access to Ethernet networks
What is 802.1x
300
Public network
What is internet
400
Security policy section that addresses the circumstance in which a person with all of the knowledge suddenly leaves the company, and all of this knowledge is gone with the person
What is separation of duties
400
private communications network transmitted across a public, typically insecure, network connection
What is VPN
400
Software that grants full system control to the user.
What is rootkit
400
Allows user to maintain a connection while roaming
What is 802.11F
400
Firewall setting where a DMZ is between two firewalls
What is back-to-back firewall
500
Policy that addresses how to deal with a security breach or disaster
What is incidence response
500
a device that controls traffic between networks, typically between a public network and private internal network.
What is a firewall
500
These attacks swamp network equipment which can cause systems to slow down or even crash.
What is DoS, DDoS
500
Currently in progress, it is capable of 200+ Mbps
What is 802.11n
500
Computers that stand outside the protected network and are exposed to an attack
What is bastion host