Security Flashcards
A firewall operating as a ____ passes or blocks traffic to specific addresses based on the type of application and the port used.
packet filter
A ___ firewall can be thought of as an intermediary between your network and any other network.
proxy
____ firewalls are used to process requests from an outside network; the ____ firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused.
Proxy
A proxy firewall typically uses two ____.
network interface cards (NICs).
*Note
This type of firewall is referred to as a dual-homed firewall.
____ proxy functions read the individual commands of the protocols that are being served.
Application-level
An implementation of this type of proxy must know the difference between ___ and ___ operations, for example, and have rules specifying how to execute them.
Get & Put
A ____ proxy creates a circuit between the client and the server and doesn’t deal with the contents of the packets that are being processed.
circuit-level
Many proxy servers also provide full ____, and other usage information that wouldn’t normally be kept by a circuit-level proxy server.
full auditing, accounting
____ inspection is also referred to as ____ packet filtering.
Stateful
____ describe how the employees in an organization can use company systems and resources, both software and hardware.
Acceptable use policies (AUPs)
A ____ attack is an attempt to guess passwords until a successful guess occurs.
brute-force
A ____ attack uses a dictionary of common words to attempt to find the user’s password.
dictionary
A ___ attack typically uses a combination of dictionary entries and brute force.
hybrid
___ are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.
Rootkits
A ____ virus exploits the enhancements made to many application programs.
macro
A ____virus attaches itself to legitimate programs and then creates a program with a different filename extension.
companion
A ____ attack is an attempt by someone or something to masquerade as someone else.
spoofing
Rather than self-replicating, like viruses and worms, ___ is spread to machines by users who inadvertently ask for it.
spyware
An ____ virus is designed to make itself difficult to detect or analyze. ____ viruses cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.
armored
A ____ virus attaches itself to legitimate programs and then creates a program with a different filename extension.
companion
A ____ virus exploits the enhancements made to many application programs.
macro
____ viruses can infect all of the documents on your system and spread to other systems via email or other methods. Macro viruses are one of the fastest-growing forms of exploitation today.
Macro
A ___ virus attacks your system in multiple ways.
multipartite
A ___ virus alters programs and databases and the only way to remove this virus is to reinstall the programs that are infected.
phage
A ____ is an algorithm or other element of a virus that uniquely identifies it.
signature