Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Security Study Guide

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
FTP Port Number(s):   show
🗑
show 22  
🗑
Telnet Port Number(s):   show
🗑
show 25  
🗑
show 49  
🗑
DNS Port Number(s):   show
🗑
show 80  
🗑
Kerberos Port Number(s):   show
🗑
show 110  
🗑
IMAP Port Number (s):   show
🗑
SSL and HTTPS Port Number(s):   show
🗑
show 636  
🗑
L2TP Port Number(s):   show
🗑
PPTP Port Number(s):   show
🗑
show 3389  
🗑
show Confidentiality, Integrity, Availablility  
🗑
show Attacker must have already gained access to the system.  
🗑
show Sting of code that cannot automatically spread from one computer to another, but can spread from file to file.  
🗑
show Interaction from a user.  
🗑
show Replication mechanism, activation mechanism and an objective.  
🗑
How will a stealth virus attempt to avoid detection?   show
🗑
What might a multipartite virus attempt?   show
🗑
What can a hoax create?   show
🗑
Detrimental effects of a hoax virus:   show
🗑
How to most virus' spread?   show
🗑
How should you prevent the spread of virus'?   show
🗑
show Worm  
🗑
It uses a network to send copies of itself to other nodes and it may do so without any user intervention:   show
🗑
It can autonomously replicate itself across a network:   show
🗑
Malicious code that mimics a legitimate program in order to steal sensitive data.   show
🗑
show Worm self replicates while a Trojan Horse does not.  
🗑
Give an example of a Trojan:   show
🗑
Will most likely open a backdoor on a system:   show
🗑
What can help mitigate Trojan threats?   show
🗑
A malicious attack that is set off by a specific event, date or time:   show
🗑
show Always has a data or time component  
🗑
Give an example of a logic bomb:   show
🗑
show An attack executes ona system every three months.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Computers sets