IS3445 CHAP 5 MITIGATING RISK WHEN CONNECTING TO THE INTERNET Flashcards
___ is any software application where advertising banners are displayed while the program is running.
Adware
___ is an agreement that outlines what can and cannot be done with the personal data of visitors to a Web site.
Client privacy agreement
___ is a cybercriminal intending harm to systems and networks.
Cracker
___ is constant and unwelcome electronic tracking of another person.
Cyberstalking
___ is an organized, hierarchical division of DNS names.
DNS namespace
___ is a hierarchical system for naming resources on a network as well as providing translation between the resource’s IP address and its domain name.
(DNS) Domain Name System
___ is the process of identifying potentially risky email and stopping it from reaching the end user.
Email filtering
___ is assuming the online identity of a person.
Identify theft
___ is a security mechanism that monitors data packets traveling across a network, comparing traffic against parameters of known threats. It is a passive security measure in that it only monitors the network and odes’t take steps to mitigate the risk.
(IDS) Intrusion detection system
___ is a security mechanism that monitors and reacts to data packets traveling across a network. It is an active security measure because it not only monitors but also blocks suspect traffic identified by the device.
(IPS) Intrusion prevention system
___ is designed to infect, corrupt, and damage Microsoft Office documents.
Macro virus
___ is an illegitimate announcement of new malware.
Malware hoax
___ is a form of malware that covertly gathers system information through the user’s Internet connection without his or her knowledge.
Spyware
- Worms are able to self-replicate.
TRUE OR FALSE
TRUE
- You have created a Web site and need to increase visitor trust. Which of the following methods are used to build trust? Select two.
- Logos
- Testimonials
- Color choice
- Font size
Logos
Testimonials
- IDS and IPS systems are a replacement for a firewall system.
TRUE OR FALSE
FALSE
- which of the following attack types is based on faking the real source of a transmission, file or email?
- Backdoor
- DDoS
- Spoofing
- Front door
Spoofing
- To increase network security, you have decided to block port 21. Which of the following services is associated with port 21?
- FTP
- HTTPS
- DNS
- SFTP
FTP
- A(n) ___ is a passive network monitoring and security system.
Intrusion detection system or IDS
- Servers within the DMS it outside of the local network.
TRUE OR FALSE.
TRUE
- Port ___ is used by the HTTP protocol.
80
- A ___ sits between the Internet and the client systems responding to client requests for Web pages.
Proxy server
- Which of the following best describes the function of the DNS server?
- Uses Media Access Control addresses to locate network systems
- Provides host name-to-IP resolution
- Provides IP name resolution
- encrypts host names
Provides host name-to-IP resolution
- A DoS attack is designed to overwhelm a particular resource making it unavailable.
TRUE OR FALSE
TRUE