Skip to main content

IS5403 HP Questions

Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator

Drag the words into the correct boxes

Adware
 adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware
 pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Keyloggers
 log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus
 malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm
 Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse
 a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot
 computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.

4
Accesses the internet on behalf of internal network clients(5,6)
A) PROXY SERVER


7
Monitors network activity for suspicious traffic and potentially performs mitigation tasks(9,10,6)
A) INTRUSION PROTECTION SYSTEM


9
Validation of who is logging on(14)
A) AUTHENTICATION

10
Mitigation of vulnerabilities(8)
A) PATCHING 

12
Monitors network activity for suspicious traffic(9,9,6)
A) INTRUSION DETECTION SYSTEM

13
Detects bad software on End points(12)
A) ANTI MALWARE

Down
1
Connects external clients like they are an internal client(7,7,7)




A) VIRTUAL PRIVATE NETWORK


2
Validation of access to restricted network locations(13)
A) AUTHORIZATION

 3
FWs check packets with this(8,10)
A) STATEFUL INSPECTION

5
Non-technical controls are called(8,3,14)
A) PHYSICAL AND ADMINISTRATIVE


6
Layered Defense(7,2,5)
A) DEFENSE IN DEPTH


8
Checks email threats(5,7)
A) EMAIL  SCANNER

11
Blocks Ports and Protocols(9)
A) FIREWALLS
























































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...