IS3220 CHAPTER 10 Flashcards
A form of threat that takes some type of initiative to seek out a target to compromise is called ___?
These can be hackers, intruders, or automated worms. These seek out vulnerable targets. If you don’t have reasonable security measures and this discovers your system, you might be at risk for a compromise.
ACTIVE THREATS
This is a small text file used by Web browsers and servers to track Web sessions is called ___?
It blocks the sending and receiving of cookies. Blocking can reduce some threats of session tracking identify theft, but can also disable many Web-based services such as online purchasing.
COOKIE FILTER
A firewall within an operating system or hardware device placed there by the vendor or manufacturer is called ___?
Can also include firewalls not necessarily installed b default, but which you can add to a system through an update or patch installation is.
NATIVE FIREWALL
Any harmful code or site that depends upon the user’s actions to be accessed or activated is called ___?
If users never visit an infected site or do not perform the risky activity, the threat never reaches them. It is similar to a virus in that it depends upon the activity of the user to activate, infect, and spread.
PASSIVE THREATS
A software tool that prevents or restricts Web sites from automatically opening additional tabs or windows without the user’s consent is called ___?
These additional windows are commonly used as methods of advertising, as well as elements in social engineering and distribution of malicious code.
POP-UP BLOCKER
- What types of internet threats are considered passive, in the sense that the user must seek them out to be harmed? (Select all that apply)
- Malicious Web sites
- Worms
- Downloaded content
- SPAM
- Trojan Horse
Malicious Web sites
Downloaded content
Trojan Horse
- Average home users and workers at a large corporation can both benefit from which of the following:
- Open-source hardware firewall
- Gateway server firewall
- Commercial appliance firewall
- Host firewall
- Proprietary device firewall
Host firewall
- What are the two locations that a home or SOHO user is likely to find a firewall by default? (Select all that apply)
- A self-installed software firewall
- Hosted by the operating system
- A build-it yourself appliance firewall
- Hosted by the ISP connection device
- A commercial firewall device
Hosted by the operating system
Hosted by the ISP connection device
- Windows operating systems are the only operating systems that include a native or default host firewall.
TRUE OR FALSE
FALSE
- What is the maximum number of host software firewalls that should be operating on a single computer at any point in time?
- One
- Two
- Three
- Four
- None
One
- Firewalls are design to provide protection for both ___ and ___ communications.
inbound
outbound
- An organization should consider purchasing last year’s model firewall instead of this year if they receive a significant discount.
TRUE OR FALSE
FALSE
- When considering the deployment of a firewall, which of the following should be considered?
- Commercial firewalls
- Legacy firewalls
- Open-source firewalls
- Beta firewalls
- Do-it-yourself (IY) firewalls
Commercial firewalls
Open-source firewalls
Do-it-yourself (IY) firewalls
- The Window 7 firewall includes a new easy-to-configure feature that allows file and printer sharing between systems authorized by a password. This feature no longer encourages users to just turn off the whole firewall rather than figure out how to properly configure file and printer sharing access rules. What is this feature called?
- Internet connection sharing
- Quick config
- Homegroup
- Shared computing
- Microsoft Easy Access Firewall
Homegroup
- What is the command line tool used to configure the Windows 7 firewall?
- route firewall
- netsh advfirewall firewall
- new use firewall
- firewall config
- netsh firewall
netsh advfirewall firewall