exam 3 - Exam-3 Random Question 1 1 1 point Which virus below combines polymorphism and stealth techniques to create a very destructive virus Question

exam 3 - Exam-3 Random Question 1 1 1 point Which virus...

This preview shows page 1 - 2 out of 9 pages.

Exam-3 Random Question 11 / 1 pointWhich virus below combines polymorphism and stealth techniques to create a very destructive virus? Question options:NatasMacroMichelangeloStoned Question 21 / 1 pointA proxy that provides Internet clients access to services on its own network is known as what type of proxy? Question 3 1 / 1 point Match each correct item with the statement below. __6 __ A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world, instead of revealing the addresses of internal LAN devices. __1 __ A portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network’s security. __9 __ A program that replicates itself to infect more computers, either through network connections when it piggybacks on other files or through exchange of external storage devices, such as USB drives, passed among users. __10 __ A program that runs independently and travels between computers and across networks. Although worms do not alter other programs as viruses do, they can carry viruses. __2 __ A software security flaw that can allow unauthorized users to gain access to a system. Legacy systems are particularly notorious for leaving these kinds of gaps in a network’s overall security net. __8 __ A specification created by the NSA to define protection standards against RF emanation, which when implemented are called EmSec (emission security). __7 __ A threat to networked hosts in which the host is flooded with broadcast ping messages. A smurf attack is a type of denial-of- service attack. __5 __ A type of intrusion detection that protects an entire network and is situated at the edge of the network or in a network’s protective perimeter, known as the DMZ (demilitarized zone). Here, it can detect many types of suspicious traffic patterns. __4 __ A type of intrusion prevention that runs on a single computer, such as a client or server, to intercept and help prevent attacks against that one host. __3 __ A type of intrusion detection that runs on a single computer, such as a client or server, to alert about attacks against that one host. 1 . acceptable use policy (AUP) 2 . backdoor 3 . HIDS (host-based intrusion detection system) 4 . HIPS (host-based intrusion prevention system) 5 . NIDS (network-based intrusion detection system) 6 . proxy service 7 . smurf attack 8 . TEMPEST 9 . virus 10 . worm
Image of page 1
Image of page 2

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture