Deck 22: Understanding Firewalls
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/16
Play
Full screen (f)
Deck 22: Understanding Firewalls
1
A good way to keep hackers out of a computer is to install a(n) ________.
firewall
2
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
backdoor; rootkit
3
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
Trojan horse
4
________ floods a computer with requests until it shuts down denying access to legitimate users.
A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
A) An encryption virus
B) A DoS attack
C) A polymorphic virus
D) Port blocking
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
5
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
6
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
A) open ports
B) e-mails
C) a botnet
D) logical ports
A) open ports
B) e-mails
C) a botnet
D) logical ports
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
7
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
8
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.
A) interceptors
B) intruders
C) sniffers
D) filters
A) interceptors
B) intruders
C) sniffers
D) filters
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
9
Attacks that are launched from multiple zombie computers at the same time are called ________.
A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
A) Trojan horses
B) distributed denial-of-service attacks (DDoS)
C) worms
D) script kiddies
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
10
A firewall designed specifically for home networks is called a ________ firewall.
A) home
B) personal
C) logical
D) static
A) home
B) personal
C) logical
D) static
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
11
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
12
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
13
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
14
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
A) packet sniffer
B) DDoS
C) packet filter
D) token
A) packet sniffer
B) DDoS
C) packet filter
D) token
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
15
ShieldsUP and LeakTest are software programs you can use to test whether ________.
A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
A) A bot
B) A Trojan horse
C) A worm
D) A zombie
A) A bot
B) A Trojan horse
C) A worm
D) A zombie
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck