89%(9)8 out of 9 people found this document helpful
This preview shows page 1 - 2 out of 9 pages.
Exam-3 RandomQuestion 11 / 1 pointWhich virus below combines polymorphism and stealth techniques to create a very destructive virus?Question options:NatasMacroMichelangeloStonedQuestion 21 / 1 pointA proxy that provides Internet clients access to services on its own network is known as what type of proxy?Question 31 / 1 pointMatch each correct item with the statement below.__6__A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world, instead of revealing the addresses of internal LAN devices.__1__A portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network’s security.__9__A program that replicates itself to infect more computers, either through network connections when it piggybacks on other files or through exchange of external storage devices, such as USB drives,passed among users.__10__A program that runs independently and travels between computers and across networks. Although worms do not alter other programs as viruses do, they can carry viruses.__2__A software security flaw that can allow unauthorized users to gain access to a system. Legacy systems are particularly notorious for leaving these kinds of gaps in a network’s overall security net.__8__A specification created by the NSA to define protection standards against RF emanation, which when implemented are called EmSec(emission security).__7__A threat to networked hosts in which the host is flooded with broadcast ping messages. A smurf attack is a type of denial-of-service attack.__5__A type of intrusion detection that protects an entire network and is situated at the edge of the network or in a network’s protective perimeter, known as the DMZ (demilitarized zone). Here, it can detect many types of suspicious traffic patterns.__4__A type of intrusion prevention that runs on a single computer, suchas a client or server, to intercept and help prevent attacks against that one host.__3__A type of intrusion detection that runs on a single computer, such as a client or server, to alert about attacks against that one host.1.acceptable use policy (AUP)2.backdoor3.HIDS (host-based intrusion detection system)4.HIPS (host-based intrusion prevention system)5.NIDS (network-based intrusion detection system)6.proxy service7.smurf attack8.TEMPEST9.virus10.worm