Skip to main content

IS5403 HP Questions

Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator

Drag the words into the correct boxes

Adware
 adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.

Spyware
 pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.

Keyloggers
 log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.

Virus
 malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.

Worm
 Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.

Trojan Horse
 a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.

Bot
 computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.

4
Accesses the internet on behalf of internal network clients(5,6)
A) PROXY SERVER


7
Monitors network activity for suspicious traffic and potentially performs mitigation tasks(9,10,6)
A) INTRUSION PROTECTION SYSTEM


9
Validation of who is logging on(14)
A) AUTHENTICATION

10
Mitigation of vulnerabilities(8)
A) PATCHING 

12
Monitors network activity for suspicious traffic(9,9,6)
A) INTRUSION DETECTION SYSTEM

13
Detects bad software on End points(12)
A) ANTI MALWARE

Down
1
Connects external clients like they are an internal client(7,7,7)




A) VIRTUAL PRIVATE NETWORK


2
Validation of access to restricted network locations(13)
A) AUTHORIZATION

 3
FWs check packets with this(8,10)
A) STATEFUL INSPECTION

5
Non-technical controls are called(8,3,14)
A) PHYSICAL AND ADMINISTRATIVE


6
Layered Defense(7,2,5)
A) DEFENSE IN DEPTH


8
Checks email threats(5,7)
A) EMAIL  SCANNER

11
Blocks Ports and Protocols(9)
A) FIREWALLS
























































































































Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5503 Cloud Computing Solutions

  Week-1 Pre Assessment 1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ? Private 2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data? Deduplication 3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task? Secure Shell Remote Desktop Protocol 4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correc...