CH9- Intro to Network Security Flashcards

1
Q

Documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spreads by replicating itself into programs or documents

A

Virus - malicious corrupting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Monopolizes network services or bandwidth from legitimate users

A

DoS (Denial of service) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Inspects packets as they go in or out of a network or computer

A

Firewall - discards or forwards based on rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A series of letters, numbers, and special characters, like a password, that both devices use to authenticate each other’s identity

A

Pre-shared key -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware that is activated when a particular event occurs

A

Logic bomb - time-dependent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A self-contained self-replicating program

A

Worm - uses network services like email to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packets are denied on context as well as packet properties

A

Stateful packet inspection - in context to an on-going conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to discover breaches in security

A

IDS (Intrusion detection system) - can counter attacks in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Permits access to computer, bypasses normal authentication

A

Backdoor -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly