cybersecurity 9

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

The category of intrusion detection systems that looks for patterns that don’t match those of normal use is called anomaly detection.

true

2
New cards

Snort is an open-source firewall.

false

3
New cards

A server with fake data used to attract an attacker is a honeypot.

true

4
New cards

When an administrator proactively seeks out intelligence on potential threats or groups, this is called infiltration.

true

5
New cards

The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.

false

6
New cards

An on-demand virus scanner runs in the background and is constantly checking your PC.

false

7
New cards

Heuristic scanning uses rules to determine whether a file or program behaves like a virus.

true

8
New cards

Linux and Windows typically are not shipped with firewalls.

false

9
New cards

A screening firewall works in the application layer of the OSI model.

false

10
New cards

A stateful packet inspection firewall examines each packet, and denies or permits access based not only on the current packet, but also on data derived from previous packets in the conversation.

true

11
New cards

A list of virus definitions is generally in a file with a ________ extension.

.dat

12
New cards

Typically, when you update virus definitions _____________.

Your computer restarts.

13
New cards

A file that stays in memory after it executes is a(n) _____________.

Terminate and Stay Resident program

14
New cards

The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

Heuristic

15
New cards

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is ________.

sandbox

16
New cards

Java and ActiveX codes should be scanned before they are _________.

Downloaded to your computer

17
New cards

Mistaking a legitimate program for a virus is a ____________.

False positive

18
New cards

A _________ is a barrier between your network and the outside world.

Firewall

19
New cards

A packet-filtering firewall is a(n)  ____________ firewall.

Packet Filtering

20
New cards

A(n)___________ firewall examines the entire conversation between client and server, not just individual packets.

Stateful Packet Inspection

21
New cards

In which firewall configuration is the software installed on an existing machine with an existing operating system?

Network host-based

22
New cards

In which firewall configuration is the firewall running on a server with at least two network interfaces?

Dual-homed host

23
New cards

A firewall ______ is a tool that can provide information after an incident has occurred.

log