Matching
Match each term with the correct statement below.
Premises:
command line interface that enables you to configure packet filter rules through the use of tables.
might take the form of simply flooding a system with more packets than it can handle.
used between network computers to verify the authenticity of the communication.
tool that may be used to designate a trusted device.
used by attackers to associate IP address information with account and password communications.
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
a list of permit and deny conditions that can be associated with a particular router interface.
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
provides information about all kinds of security threats.
Responses:
IPTables
digital certificate
National Security Institute (NSI)
worm
sniffer software
remote denial of service (DoS)attack
Security Level Configuration
spyware
access control list (ACL)
Correct Answer:
Premises:
Responses:
command line interface that enables you to configure packet filter rules through the use of tables.
might take the form of simply flooding a system with more packets than it can handle.
used between network computers to verify the authenticity of the communication.
tool that may be used to designate a trusted device.
used by attackers to associate IP address information with account and password communications.
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
a list of permit and deny conditions that can be associated with a particular router interface.
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
provides information about all kinds of security threats.
Premises:
command line interface that enables you to configure packet filter rules through the use of tables.
might take the form of simply flooding a system with more packets than it can handle.
used between network computers to verify the authenticity of the communication.
tool that may be used to designate a trusted device.
used by attackers to associate IP address information with account and password communications.
software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
a list of permit and deny conditions that can be associated with a particular router interface.
a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
provides information about all kinds of security threats.
Responses:
Related Questions
Q24: A DoS attack that floods a host
Q32: Provide a description of service packs.
Q36: If you want to block access to
Q36: Identify four network hardening techniques.
Q37: _ involves taking specific actions to block
Q38: How does a source routing attack work?
Q42: How does a buffer attack work?
Q43: Identify four tasks that can be fulfilled
Q47: What are the advantages of using Network
Q48: Provide a general description for how routers
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents