Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?
Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?
Which of the following terms is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks?
In which of the following attacks is the attacker able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side?
When users from outside the network attach to a service inside the network, they actually attach to the proxy server, which establishes a proxy session into the private side of the network from there.
Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?
Which of the following is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature?
Which of the following terms means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information?
Which of the following software programs can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses?
A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections.
Indicate the answer choice that best completes the statement or answers the question.
Which type of device makes access control decisions on the basis of application content rather than by looking at IP addresses or port numbers and can act on a host to deny potentially malicious activity?
Proxy server software permits internal network addresses to be "translated" into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.