Study sets, textbooks, questions
Upgrade to remove ads
Chapter 1: Modern Network Security Threats
Modern Network Security Threats
Terms in this set (6)
What are the basic phases of attack that can be used by a virus or worm in sequential order?
probe, penetrate, persist, propagate, and paralyze
Which two are characteristics of DoS attacks? (Two Answers)
-They attempt to compromise the availability of a network, host, or application.
-Examples include smurf attacks and ping of death attacks.
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?
A virus has infected the computers.
What are three types of access attacks? (Three Answers)
What occurs during a spoofing attack?
One device falsifies data to gain access to privileged information.
What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.
Other sets by this creator
Chapter 3 - Basic Cryptography
CCNA2 v7 Module 8 - SLAAC and DHCPv6
CCNA2 v7 Module 7 - DHCPv4
CCNA 2 v7 Modules 1-4: Switching Concept…
Expressed powers are those that are? A) Specifically granted in the Constitution. B) Held by both the federal government and the states. C) Considered the basis for the “necessary and proper” clause. D) Inferior compared to powers directly given by Congress.
Which of the following describes what is meant by differential association? a. Crime is more likely to occur among individuals who have been treated differently b. People may become criminals through close association with criminals c. Crime is not transmitted culturally d. crime comes from conflict between two cultures
What are your beliefs on capital punishment? Defend your viewpoint.
Sociologists define three types of family structures. List and describe those structures.
Other Quizlet sets
Ananas Nice to Meet You #1 answers set of 15 by:Ky…
BIOL 2404 CHAPTER 11 PART 4
Sport Psych Quiz 4
HTH 5900 Exam 1