1.3 Threat Management Flashcards
what is the most secure implementation of file transfer protocol (FTP)?
secure file transfer protocol (SFTP)
what is the name for a hole in the security of an application deliberately left in place by a designer?
backdoor
which malicious software infects a system without relying upon other applications for its execution?
a worm
what does an anti-virus application signature file contain?
it contains identifying information about viruses
which application or services uses TCP/UDP port 3389?
remote desktop protocol (RDP)
which port number is used by TFTP?
UDP port 69
what is the name for a fix that addresses a specific windows system problem or set of problems?
hotfix
which firewall port should you enable to allow SMTP trafic to flow through the firewall?
port 25
how many TCP/UDP ports are vulnerable to malicious attacks?
65,536
which type of virus can change its signature to avoid detection?
polymorphic
what is the default PPTP port?
TCP port 1723
what is the purpose of NAC?
network access control (NAC) ensures that the computer on the network meets an organization’s security policies
using role-based access control (RBAC), which entities are assigned roles?
users or subjects
what is the name of the area that connects to a firewall and offers services to untrusted networks?
DMZ
which virus creates many variants by modifying its code to deceive antivirus scanners?
polymorphic virus
which port should you block at your network firewall to prevent telnet access?
port 23
what is a good solution if you need to separate two departments into separate networks?
VLAN segregation
which port number does LDAP use for communications encrypted using SSL/TLS?
port 636
which type of code performs malicious acts only when a certain set of conditions occurs?
a logic bomb
which firewall port should you enable to allow IMAP4 traffic to flow through the firewall?
TCP port 143
which two port does FTP use?
ports 20 and 21
what does VLAN segregation accomplish?
it protects each individual segment by isolating the segments