Skip to main content

IS5403 HP Questions

Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator

Drag the words into the correct boxes

Adware
 adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware
 pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Keyloggers
 log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus
 malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm
 Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse
 a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot
 computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.

4
Accesses the internet on behalf of internal network clients(5,6)
A) PROXY SERVER


7
Monitors network activity for suspicious traffic and potentially performs mitigation tasks(9,10,6)
A) INTRUSION PROTECTION SYSTEM


9
Validation of who is logging on(14)
A) AUTHENTICATION

10
Mitigation of vulnerabilities(8)
A) PATCHING 

12
Monitors network activity for suspicious traffic(9,9,6)
A) INTRUSION DETECTION SYSTEM

13
Detects bad software on End points(12)
A) ANTI MALWARE

Down
1
Connects external clients like they are an internal client(7,7,7)




A) VIRTUAL PRIVATE NETWORK


2
Validation of access to restricted network locations(13)
A) AUTHORIZATION

 3
FWs check packets with this(8,10)
A) STATEFUL INSPECTION

5
Non-technical controls are called(8,3,14)
A) PHYSICAL AND ADMINISTRATIVE


6
Layered Defense(7,2,5)
A) DEFENSE IN DEPTH


8
Checks email threats(5,7)
A) EMAIL  SCANNER

11
Blocks Ports and Protocols(9)
A) FIREWALLS
























































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh