Deck 22: Understanding Firewalls

Full screen (f)
exit full mode
Question
A good way to keep hackers out of a computer is to install a(n) ________.
Use Space or
up arrow
down arrow
to flip the card.
Question
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
Question
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
Question
________ floods a computer with requests until it shuts down denying access to legitimate users.

A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
Question
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
Question
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

A) open ports
B) e-mails
C) a botnet
D) logical ports
Question
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
Question
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

A) interceptors
B) intruders
C) sniffers
D) filters
Question
Attacks that are launched from multiple zombie computers at the same time are called ________.

A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
Question
A firewall designed specifically for home networks is called a ________ firewall.

A) home
B) personal
C) logical
D) static
Question
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
Question
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
Question
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
Question
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

A) packet sniffer
B) DDoS
C) packet filter
D) token
Question
ShieldsUP and LeakTest are software programs you can use to test whether ________.

A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
Question
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A) A bot
B) A Trojan horse
C) A worm
D) A zombie
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 22: Understanding Firewalls
1
A good way to keep hackers out of a computer is to install a(n) ________.
firewall
2
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
backdoor; rootkit
3
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
Trojan horse
4
________ floods a computer with requests until it shuts down denying access to legitimate users.

A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
5
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
6
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

A) open ports
B) e-mails
C) a botnet
D) logical ports
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
7
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
8
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

A) interceptors
B) intruders
C) sniffers
D) filters
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
9
Attacks that are launched from multiple zombie computers at the same time are called ________.

A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
10
A firewall designed specifically for home networks is called a ________ firewall.

A) home
B) personal
C) logical
D) static
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
11
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
12
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
13
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
14
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

A) packet sniffer
B) DDoS
C) packet filter
D) token
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
15
ShieldsUP and LeakTest are software programs you can use to test whether ________.

A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A) A bot
B) A Trojan horse
C) A worm
D) A zombie
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 16 flashcards in this deck.