Exam-3 Random
Question 11 / 1 pointWhich virus below combines polymorphism and stealth techniques to create a very destructive virus?
Question options:NatasMacroMichelangeloStoned
Question 21 / 1 pointA proxy that provides Internet clients access to services on its own network is known as what type of proxy?
Question
3
1 / 1
point
Match each correct item with the statement below.
__6
__
A software application on a network host that acts as an
intermediary between the external and internal networks,
screening all incoming and outgoing traffic and providing one
address to the outside world, instead of revealing the addresses of
internal LAN devices.
__1
__
A portion of the security policy that explains to users what they
can and cannot do, and penalties for violations. It might also
describe how these measures protect the network’s security.
__9
__
A program that replicates itself to infect more computers, either
through network connections when it piggybacks on other files or
through exchange of external storage devices, such as USB drives,
passed among users.
__10
__
A program that runs independently and travels between computers
and across networks. Although worms do not alter other programs
as viruses do, they can carry viruses.
__2
__
A software security flaw that can allow unauthorized users to gain
access to a system. Legacy systems are particularly notorious for
leaving these kinds of gaps in a network’s overall security net.
__8
__
A specification created by the NSA to define protection standards
against RF emanation, which when implemented are called EmSec
(emission security).
__7
__
A threat to networked hosts in which the host is flooded with
broadcast ping messages. A smurf attack is a type of denial-of-
service attack.
__5
__
A type of intrusion detection that protects an entire network and is
situated at the edge of the network or in a network’s
protective perimeter, known as the DMZ (demilitarized zone).
Here, it can detect many types of suspicious traffic patterns.
__4
__
A type of intrusion prevention that runs on a single computer, such
as a client or server, to intercept and help prevent attacks
against that one host.
__3
__
A type of intrusion detection that runs on a single computer, such
as a client or server, to alert about attacks against that one host.
1
.
acceptable use policy (AUP)
2
.
backdoor
3
.
HIDS (host-based intrusion detection system)
4
.
HIPS (host-based intrusion prevention system)
5
.
NIDS (network-based intrusion detection system)
6
.
proxy service
7
.
smurf attack
8
.
TEMPEST
9
.
virus
10
.
worm

