88%(16)14 out of 16 people found this document helpful
This preview shows page 1 - 3 out of 10 pages.
Malware cannot inflict physical damage to systems. Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?A hardware/software based method that controls incoming and outgoing data traffic based on a set of guidelines that either permit or deny traffic on a network or host is _________.A framework that utilizes a Network Policy Server is called __________.What is the common term for a software that is considered as nonessential, whoseimplementation can compromise privacy or weaken the computer's security?MalwarePotentially Unwanted ProgramSpamMalicious ProgramThe telephone version of phishing that exploits social engineering techniques isknown as __________.What is the type of attack in which the attacker intercepts the information in transit without altering it?A framework that utilizes a Network Policy Server is called __________.
Endpoint SecurityEndpoint ProtectionAn extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________.Terminal-Access Controller Access Control SystemNetwork Access Controller Access Control System XEndpoint Access Controller Access Control System__________ is the process that allows a device to check the identity and authenticity of a person who needs to connect to a network resource.User AuthenticationIntegrity CheckPassword VerificationWhat is PUP?Which of the following is an effective solution to ensure confidentiality?As an application of cryptography, digital Signatures and MACs can be used for _____________.Authentication_________ is commonly known for providing backdoor access to the system for malicious users.If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?