TF Cybersecurity Prologue Cleared.txt - Malware cannot inflict physical damage to systems False Which of the following is used to draw in users and

TF Cybersecurity Prologue Cleared.txt - Malware cannot...

This preview shows page 1 - 3 out of 10 pages.

Malware cannot inflict physical damage to systems. Which of the following is used to draw in users and infect them and deploy fast changing infrastructures? A hardware/software based method that controls incoming and outgoing data traffic based on a set of guidelines that either permit or deny traffic on a network or host is _________. A framework that utilizes a Network Policy Server is called __________. What is the common term for a software that is considered as nonessential, whoseimplementation can compromise privacy or weaken the computer's security? MalwarePotentially Unwanted ProgramSpamMalicious Program The telephone version of phishing that exploits social engineering techniques isknown as __________. What is the type of attack in which the attacker intercepts the information in transit without altering it? A framework that utilizes a Network Policy Server is called __________.
Image of page 1
Endpoint Security Endpoint Protection An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________. Terminal-Access Controller Access Control SystemNetwork Access Controller Access Control System XEndpoint Access Controller Access Control System __________ is the process that allows a device to check the identity and authenticity of a person who needs to connect to a network resource. User Authentication Integrity Check Password Verification What is PUP? Which of the following is an effective solution to ensure confidentiality? As an application of cryptography, digital Signatures and MACs can be used for _____________.Authentication_________ is commonly known for providing backdoor access to the system for malicious users. If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be? The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________. What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
Image of page 2
Image of page 3

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture