CT4 General Flashcards
Three main types of firewall rules are?
Packet filtering
Proxy
Stateful inspection
When the trigger condition is met the virus unleashes its payload?
Delivery
A technique by which several hosts or computers share a single IP address for access to the Internet?
Network address translation
Unsolicited bulk email?
Spam
A system of computers, peripherals, terminals and databases connected by communication lines?
A network
A temporary IP address is also called a ?
Dynamic IP address
10.0.0.0 is an example of a ?
Private IP address
Allows you to direct inbound Internet traffic to connect to a specific application or computer within a private LAN via a predefined port?
Port forwarding
Provides the ability to dynamically open a specific inbound port based on a request from a local computer or user?
Port triggering
A secure connection to an organization private network?
VPN
IP address used on an IP gateway?
Gateway IP
Identifies all hosts/devices on the LAN?
Broadcast IP
/28 is a subnet of what and with how many static IP addresses?
255.255.255.240
13 static IP addresses
Forwards requests for particular port pair to another port pair?
Port address translation
IP address that encompasses the entire subnetwork (lowest in the value)
Network IP address
/30 is a subnet of what and how many static IP addresses ?
255.255.255.252
1 static IP address
IP address that is used on customer equipment ( usually static )
Routable IP address
/29 is a subnet of what and how many static ip addresses?
255.255.255.248
5 static ip addresses
2.4Ghz @ 100-150’ and speeds of 11Mbps?
802.11b
Allows you to open or close specific inbound ports to connected computers or firewalls configured with a public routable IP address?
True static ip port management
Enables you to request specific local hosts from accessing particular Internet applications?
Port blocking
2.4Ghz @ up to 160’ and speeds of 100+Mbps?
802.11n
Every time a virus runs it checks for certain conditions, usually a specific date. Whenever the trigger condition exists the virus delivers its destructive payload.
Event watching
This type of IP address is visible to the public?
Routable IP address
5Ghz @ 75’ speeds up to 54Mbps
802.11a
This virus inserts copies of itself into other program files.
Replication
Stealth viruses disguise themselves to avoid detection by antivirus software?
Camouflage
2.4Ghz @ 100-150’ and speeds up to 54 Mbps
802.11g
Tech log in credentials for business gateway ?
Username - mso
Password- “password of the day”
Using the gateway a customer can manage their users access to the Internet. Users can be blocked access to specific websites.
User access management
Provides essential protection for businesses by blocking unwanted users and data traffic from entering the LAN?
Firewall protection
The main types of virus?
Executable
Email
Worms
Trojan horse
Variant of spyware that displays advertising for products it thinks might interest you based on the website you are browsing ?
Adware
Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive?
Spyware
T568a connection?
Wg/G/Wo/B/Wb/O/Wbr/Br
In its simplest form, ________ is an electronic message?