Malware that can lay dormant until summoned by an attacker is considered this.
What is a virus.
This is a program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected.
What is a software firewall.
While you cannot stop this threat, you can diminish it by running a filter on your email.
What is Spam.
These are three things you can do to avoid being attached via social engineering.
This is the solution of a user receiving hundreds or thousands of junk mail each day.
This looks like a useful program but actually holds malicious code.
What is a trojan horse.
This compares physical characteristics against stored profiles to authenticate people.
Biometric Security
These are used in the process of a DDoS attack as an army. They are also the first to be infected.
What are Zombie computers.
An administrator configures this that applies to all computers that join a domain. Account policies are automatically set when a user logs in to Windows.
What is a Domain Security Policy.
This is why all my Windows Updates fail.
What is the update is corrupted or the update requires a previous update that is not installed.
This malware is very difficult to detect because it can conceal itself.
What is a Rootkit.
This store private information, such as bank account numbers, personal identification, medical records, and digital signatures.
What is smart card security.
This type of attack randomly opens TCP ports at the source of the attack and ties up the network equipment or computer with a large amount of false requests.
What is a SYN flood.
The system administrator usually defines this for usernames when creating network logins.
What is a naming convention.
This is causing all my files to disappear.
What is antivirus, antispyware, and adware removal tools.
This is a process which is more secure than a username and password combination.
What is two-factor authentication.
This type of attack is used to manipulate messages and relay false information between hosts, because the hosts are unaware that the messages have been modified.
What is man-in-the-middle.
These are the recommended three levels of password protection.
What are
- The BIOS login
- The OS login
- The Network login
Changing my email password and contacting the email service support is a way of solving this problem.
What is a hijacked email.
Many organizations establish this stating that employees are not permitted to install any software that is not provided by the company.
what is a written security policy.
These are the five types of permissions.
What are
- Full control
-Modify
-Read & Execute
-Read
-Write
The term zero-hour describes this.
What is the moment when the exploited vulnerability is discovered by the manufacturer.
These are the four guidelines for strong password.
What are
-Minimum length
-Complexity
- Variety
-Expiration
This is what you should do if you see an unknown person looking under keyboards and on desktops.
What is contact security.