Deck 22: Understanding Firewalls

ملء الشاشة (f)
exit full mode
سؤال
A good way to keep hackers out of a computer is to install a(n) ________.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
سؤال
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
سؤال
________ floods a computer with requests until it shuts down denying access to legitimate users.

A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
سؤال
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
سؤال
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

A) open ports
B) e-mails
C) a botnet
D) logical ports
سؤال
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
سؤال
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

A) interceptors
B) intruders
C) sniffers
D) filters
سؤال
Attacks that are launched from multiple zombie computers at the same time are called ________.

A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
سؤال
A firewall designed specifically for home networks is called a ________ firewall.

A) home
B) personal
C) logical
D) static
سؤال
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
سؤال
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
سؤال
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
سؤال
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

A) packet sniffer
B) DDoS
C) packet filter
D) token
سؤال
ShieldsUP and LeakTest are software programs you can use to test whether ________.

A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
سؤال
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A) A bot
B) A Trojan horse
C) A worm
D) A zombie
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 22: Understanding Firewalls
1
A good way to keep hackers out of a computer is to install a(n) ________.
firewall
2
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
backdoor; rootkit
3
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
Trojan horse
4
________ floods a computer with requests until it shuts down denying access to legitimate users.

A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
5
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
6
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

A) open ports
B) e-mails
C) a botnet
D) logical ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
7
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
8
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

A) interceptors
B) intruders
C) sniffers
D) filters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
9
Attacks that are launched from multiple zombie computers at the same time are called ________.

A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
10
A firewall designed specifically for home networks is called a ________ firewall.

A) home
B) personal
C) logical
D) static
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
11
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
13
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
14
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

A) packet sniffer
B) DDoS
C) packet filter
D) token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
15
ShieldsUP and LeakTest are software programs you can use to test whether ________.

A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A) A bot
B) A Trojan horse
C) A worm
D) A zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.