Deck 10: Introduction to Network Security

ملء الشاشة (f)
exit full mode
سؤال
____ is the standard software service on many Linux distributions for authenticating users.

A)Password Policy
B)Shadow
C)MMC
D)PAM
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
سؤال
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.

A)PPTP
B)L2TP
C)PPP
D)SLIP
سؤال
____ allows administrators to control who has access to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
سؤال
____ allows administrators to control what users can do after they are logged on to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
سؤال
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
سؤال
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.

A)password
B)passwd
C)shadow
D)pwd
سؤال
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.

A)sharing
B)NTFS
C)folder
D)access
سؤال
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.

A)Digital
B)Kerberos
C)PAM
D)VPN
سؤال
A VPN is limited to dial-up connections.
سؤال
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).

A)PPTP
B)IDS
C)PPP
D)SLIP
سؤال
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.

A)IDS
B)VPN
C)rootkit
D)packet sniffer
سؤال
IPSec works by establishing a(n)____ between two communicating devices.

A)circuit
B)channel
C)association
D)tunnel
سؤال
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.

A)gpg
B)efs
C)ipsec
D)tar
سؤال
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.

A)IDSs
B)RRASs
C)Firewalls
D)VPNs
سؤال
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.

A)SSL
B)VPN
C)IPSec
D)SSH
سؤال
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
سؤال
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.

A)sharing
B)NTFS
C)folder
D)access
سؤال
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
سؤال
Spam is simply unsolicited e-mail.
سؤال
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
سؤال
What are the basic guidelines that a network security policy should follow?
سؤال
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.

A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
سؤال
What are the elements of a security policy? Briefly describe each.
سؤال
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
سؤال
A ____ is a program that spreads by replicating itself into other programs or documents.

A)worm
B)virus
C)backdoor
D)malware
سؤال
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.

A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
سؤال
What is a highly restrictive security policy?
سؤال
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.

A)spoofed address
B)ping flood
C)IDS
D)DoS
سؤال
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
سؤال
Digital certificates involve a third party called a(n)_________________________ (CA).
سؤال
Describe some of the physical security best practices.
سؤال
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.

A)worm
B)rootkit
C)backdoor
D)malware
سؤال
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
سؤال
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
سؤال
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
سؤال
Attackers who drive around looking for wireless LANs to intercept are called ____.

A)Trojans
B)worms
C)packet sniffers
D)wardrivers
سؤال
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.

A)gateway
B)IDS
C)firewall
D)router
سؤال
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.

A)worm
B)rootkit
C)backdoor
D)malware
سؤال
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.

A)worm
B)rootkit
C)backdoor
D)Trojan
سؤال
Match between columns
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
encryption
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
penetration tester
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
cracker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
hacker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
MAC filtering
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
ping scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
port scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
Whois
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
encryption
term used sometimes by white hats for their consulting services
penetration tester
term used sometimes by white hats for their consulting services
cracker
term used sometimes by white hats for their consulting services
hacker
term used sometimes by white hats for their consulting services
MAC filtering
term used sometimes by white hats for their consulting services
ping scanner
term used sometimes by white hats for their consulting services
port scanner
term used sometimes by white hats for their consulting services
Whois
term used sometimes by white hats for their consulting services
protocol analyzer
handy utility for discovering information about an Internet domain
encryption
handy utility for discovering information about an Internet domain
penetration tester
handy utility for discovering information about an Internet domain
cracker
handy utility for discovering information about an Internet domain
hacker
handy utility for discovering information about an Internet domain
MAC filtering
handy utility for discovering information about an Internet domain
ping scanner
handy utility for discovering information about an Internet domain
port scanner
handy utility for discovering information about an Internet domain
Whois
handy utility for discovering information about an Internet domain
protocol analyzer
security feature used on some wireless access points
encryption
security feature used on some wireless access points
penetration tester
security feature used on some wireless access points
cracker
security feature used on some wireless access points
hacker
security feature used on some wireless access points
MAC filtering
security feature used on some wireless access points
ping scanner
security feature used on some wireless access points
port scanner
security feature used on some wireless access points
Whois
security feature used on some wireless access points
protocol analyzer
automated method for pinging a range of IP addresses
encryption
automated method for pinging a range of IP addresses
penetration tester
automated method for pinging a range of IP addresses
cracker
automated method for pinging a range of IP addresses
hacker
automated method for pinging a range of IP addresses
MAC filtering
automated method for pinging a range of IP addresses
ping scanner
automated method for pinging a range of IP addresses
port scanner
automated method for pinging a range of IP addresses
Whois
automated method for pinging a range of IP addresses
protocol analyzer
determines which TCP and UDP ports are available on a particular computer or device
encryption
determines which TCP and UDP ports are available on a particular computer or device
penetration tester
determines which TCP and UDP ports are available on a particular computer or device
cracker
determines which TCP and UDP ports are available on a particular computer or device
hacker
determines which TCP and UDP ports are available on a particular computer or device
MAC filtering
determines which TCP and UDP ports are available on a particular computer or device
ping scanner
determines which TCP and UDP ports are available on a particular computer or device
port scanner
determines which TCP and UDP ports are available on a particular computer or device
Whois
determines which TCP and UDP ports are available on a particular computer or device
protocol analyzer
allows you to capture packets and determine which protocols services are running
encryption
allows you to capture packets and determine which protocols services are running
penetration tester
allows you to capture packets and determine which protocols services are running
cracker
allows you to capture packets and determine which protocols services are running
hacker
allows you to capture packets and determine which protocols services are running
MAC filtering
allows you to capture packets and determine which protocols services are running
ping scanner
allows you to capture packets and determine which protocols services are running
port scanner
allows you to capture packets and determine which protocols services are running
Whois
allows you to capture packets and determine which protocols services are running
protocol analyzer
sometimes a derogatory term to describe an unskilled or undisciplined programmer
encryption
sometimes a derogatory term to describe an unskilled or undisciplined programmer
penetration tester
sometimes a derogatory term to describe an unskilled or undisciplined programmer
cracker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
hacker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
MAC filtering
sometimes a derogatory term to describe an unskilled or undisciplined programmer
ping scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
port scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
Whois
sometimes a derogatory term to describe an unskilled or undisciplined programmer
protocol analyzer
used to safeguard data as it travels across the Internet and even within the company network
encryption
used to safeguard data as it travels across the Internet and even within the company network
penetration tester
used to safeguard data as it travels across the Internet and even within the company network
cracker
used to safeguard data as it travels across the Internet and even within the company network
hacker
used to safeguard data as it travels across the Internet and even within the company network
MAC filtering
used to safeguard data as it travels across the Internet and even within the company network
ping scanner
used to safeguard data as it travels across the Internet and even within the company network
port scanner
used to safeguard data as it travels across the Internet and even within the company network
Whois
used to safeguard data as it travels across the Internet and even within the company network
protocol analyzer
سؤال
What is a hoax virus?
سؤال
How can you use NAT to improve security?
سؤال
What is the 802.11i standard?
سؤال
What are the rules or guidelines for creating secure passwords?
سؤال
What are the benefits of using VPNs?
سؤال
How can you create VPNs in a Windows environment?
سؤال
Can you use a firewall as a router? Explain.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Introduction to Network Security
1
____ is the standard software service on many Linux distributions for authenticating users.

A)Password Policy
B)Shadow
C)MMC
D)PAM
D
2
WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.
False
3
____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.

A)PPTP
B)L2TP
C)PPP
D)SLIP
B
4
____ allows administrators to control who has access to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ allows administrators to control what users can do after they are logged on to the network.

A)Authentication
B)Authorization
C)Logging
D)Penetration testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
6
A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
7
On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory.

A)password
B)passwd
C)shadow
D)pwd
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
8
In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.

A)sharing
B)NTFS
C)folder
D)access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.

A)Digital
B)Kerberos
C)PAM
D)VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
10
A VPN is limited to dial-up connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
11
With ____, a user running a Windows OS can dial up a Windows server when it's running Routing and Remote Access Service (RRAS).

A)PPTP
B)IDS
C)PPP
D)SLIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
12
Encryption prevents somebody using eavesdropping technology, such as a(n)____, from capturing packets and using data in the packets for malicious purposes.

A)IDS
B)VPN
C)rootkit
D)packet sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
13
IPSec works by establishing a(n)____ between two communicating devices.

A)circuit
B)channel
C)association
D)tunnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
14
On Linux systems, a simple method to encrypt files involves using a command-line program called ____.

A)gpg
B)efs
C)ipsec
D)tar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.

A)IDSs
B)RRASs
C)Firewalls
D)VPNs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
16
The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____.

A)SSL
B)VPN
C)IPSec
D)SSH
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
17
IPSec is an excellent way to secure data as it travels across a network, and to secure data on disk drives to block someone from gaining unauthorized access to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
18
Windows OSs ____ permissions are applied to folders (and only folders)shared over the network.

A)sharing
B)NTFS
C)folder
D)access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
19
An intrusion detection system (IDS)usually works with a firewall or router with access control lists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
20
Spam is simply unsolicited e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
21
In Windows XP, Vista, and Server 2003, _________________________ (EFS)is a standard feature available on NTFS-formatted disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are the basic guidelines that a network security policy should follow?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ are a form of Trojan programs that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords.

A)Worms
B)Rootkits
C)Backdoors
D)Packet sniffers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
24
What are the elements of a security policy? Briefly describe each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
25
Firewalls can attempt to determine the context of a packet; this process is called ______________________________ (SPI).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ____ is a program that spreads by replicating itself into other programs or documents.

A)worm
B)virus
C)backdoor
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ monitors or in some way controls part of your computer at the expense of your privacy and to the gain of some third party.

A)Spyware
B)A rootkit
C)A Trojan program
D)A backdoor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is a highly restrictive security policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n)____ attack is an attacker's attempt to tie up network bandwidth or network services so that it renders those resources useless to legitimate users.

A)spoofed address
B)ping flood
C)IDS
D)DoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n)____________________ address is a source address inserted into the packet that isn't the actual address of the sending station.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
31
Digital certificates involve a third party called a(n)_________________________ (CA).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe some of the physical security best practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ____ is similar to a virus in that it's self-replicating, but it doesn't attach itself to another program; rather, it's a self-contained program.

A)worm
B)rootkit
C)backdoor
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
34
______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
35
Viruses, worms, and rootkits are part of a broader category of software called ____________________, which is any software designed to cause harm or disruption to a computer system or perform activities on a computer without the consent of the computer's owner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
37
Attackers who drive around looking for wireless LANs to intercept are called ____.

A)Trojans
B)worms
C)packet sniffers
D)wardrivers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n)____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.

A)gateway
B)IDS
C)firewall
D)router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ____ is a program installed on a computer that permits access to the computer, bypassing the normal authentication process.

A)worm
B)rootkit
C)backdoor
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ____ program appears to be something useful, such as a free utility, but in reality contains some type of malware.

A)worm
B)rootkit
C)backdoor
D)Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
encryption
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
penetration tester
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
cracker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
hacker
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
MAC filtering
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
ping scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
port scanner
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
Whois
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
protocol analyzer
term used sometimes by white hats for their consulting services
encryption
term used sometimes by white hats for their consulting services
penetration tester
term used sometimes by white hats for their consulting services
cracker
term used sometimes by white hats for their consulting services
hacker
term used sometimes by white hats for their consulting services
MAC filtering
term used sometimes by white hats for their consulting services
ping scanner
term used sometimes by white hats for their consulting services
port scanner
term used sometimes by white hats for their consulting services
Whois
term used sometimes by white hats for their consulting services
protocol analyzer
handy utility for discovering information about an Internet domain
encryption
handy utility for discovering information about an Internet domain
penetration tester
handy utility for discovering information about an Internet domain
cracker
handy utility for discovering information about an Internet domain
hacker
handy utility for discovering information about an Internet domain
MAC filtering
handy utility for discovering information about an Internet domain
ping scanner
handy utility for discovering information about an Internet domain
port scanner
handy utility for discovering information about an Internet domain
Whois
handy utility for discovering information about an Internet domain
protocol analyzer
security feature used on some wireless access points
encryption
security feature used on some wireless access points
penetration tester
security feature used on some wireless access points
cracker
security feature used on some wireless access points
hacker
security feature used on some wireless access points
MAC filtering
security feature used on some wireless access points
ping scanner
security feature used on some wireless access points
port scanner
security feature used on some wireless access points
Whois
security feature used on some wireless access points
protocol analyzer
automated method for pinging a range of IP addresses
encryption
automated method for pinging a range of IP addresses
penetration tester
automated method for pinging a range of IP addresses
cracker
automated method for pinging a range of IP addresses
hacker
automated method for pinging a range of IP addresses
MAC filtering
automated method for pinging a range of IP addresses
ping scanner
automated method for pinging a range of IP addresses
port scanner
automated method for pinging a range of IP addresses
Whois
automated method for pinging a range of IP addresses
protocol analyzer
determines which TCP and UDP ports are available on a particular computer or device
encryption
determines which TCP and UDP ports are available on a particular computer or device
penetration tester
determines which TCP and UDP ports are available on a particular computer or device
cracker
determines which TCP and UDP ports are available on a particular computer or device
hacker
determines which TCP and UDP ports are available on a particular computer or device
MAC filtering
determines which TCP and UDP ports are available on a particular computer or device
ping scanner
determines which TCP and UDP ports are available on a particular computer or device
port scanner
determines which TCP and UDP ports are available on a particular computer or device
Whois
determines which TCP and UDP ports are available on a particular computer or device
protocol analyzer
allows you to capture packets and determine which protocols services are running
encryption
allows you to capture packets and determine which protocols services are running
penetration tester
allows you to capture packets and determine which protocols services are running
cracker
allows you to capture packets and determine which protocols services are running
hacker
allows you to capture packets and determine which protocols services are running
MAC filtering
allows you to capture packets and determine which protocols services are running
ping scanner
allows you to capture packets and determine which protocols services are running
port scanner
allows you to capture packets and determine which protocols services are running
Whois
allows you to capture packets and determine which protocols services are running
protocol analyzer
sometimes a derogatory term to describe an unskilled or undisciplined programmer
encryption
sometimes a derogatory term to describe an unskilled or undisciplined programmer
penetration tester
sometimes a derogatory term to describe an unskilled or undisciplined programmer
cracker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
hacker
sometimes a derogatory term to describe an unskilled or undisciplined programmer
MAC filtering
sometimes a derogatory term to describe an unskilled or undisciplined programmer
ping scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
port scanner
sometimes a derogatory term to describe an unskilled or undisciplined programmer
Whois
sometimes a derogatory term to describe an unskilled or undisciplined programmer
protocol analyzer
used to safeguard data as it travels across the Internet and even within the company network
encryption
used to safeguard data as it travels across the Internet and even within the company network
penetration tester
used to safeguard data as it travels across the Internet and even within the company network
cracker
used to safeguard data as it travels across the Internet and even within the company network
hacker
used to safeguard data as it travels across the Internet and even within the company network
MAC filtering
used to safeguard data as it travels across the Internet and even within the company network
ping scanner
used to safeguard data as it travels across the Internet and even within the company network
port scanner
used to safeguard data as it travels across the Internet and even within the company network
Whois
used to safeguard data as it travels across the Internet and even within the company network
protocol analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a hoax virus?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
43
How can you use NAT to improve security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is the 802.11i standard?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are the rules or guidelines for creating secure passwords?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the benefits of using VPNs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
47
How can you create VPNs in a Windows environment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
48
Can you use a firewall as a router? Explain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.