Deck 22: Understanding Firewalls
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/16
العب
ملء الشاشة (f)
Deck 22: Understanding Firewalls
1
A good way to keep hackers out of a computer is to install a(n) ________.
firewall
2
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
backdoor; rootkit
3
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
Trojan horse
4
________ floods a computer with requests until it shuts down denying access to legitimate users.
A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
5
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
6
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
A) open ports
B) e-mails
C) a botnet
D) logical ports
A) open ports
B) e-mails
C) a botnet
D) logical ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
7
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
8
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.
A) interceptors
B) intruders
C) sniffers
D) filters
A) interceptors
B) intruders
C) sniffers
D) filters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
9
Attacks that are launched from multiple zombie computers at the same time are called ________.
A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
10
A firewall designed specifically for home networks is called a ________ firewall.
A) home
B) personal
C) logical
D) static
A) home
B) personal
C) logical
D) static
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
11
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
13
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
14
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
A) packet sniffer
B) DDoS
C) packet filter
D) token
A) packet sniffer
B) DDoS
C) packet filter
D) token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
15
ShieldsUP and LeakTest are software programs you can use to test whether ________.
A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
A) A bot
B) A Trojan horse
C) A worm
D) A zombie
A) A bot
B) A Trojan horse
C) A worm
D) A zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck