Matching
Match each term with the correct statement below.
Premises:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Responses:
protocol analyzer
hacker
port scanner
MAC filtering
encryption
cracker
penetration tester
ping scanner
Whois
Correct Answer:
Premises:
Responses:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Premises:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Responses:
Related Questions
Q36: A(n)_ firewall is installed on a computer
Q37: Attackers who drive around looking for wireless
Q38: A(n)_ is a hardware device or software
Q39: A _ is a program installed on
Q40: A _ program appears to be something
Q42: What is a hoax virus?
Q43: How can you use NAT to improve
Q44: What is the 802.11i standard?
Q45: What are the rules or guidelines for
Q46: What are the benefits of using VPNs?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents