Security Study Guide
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
FTP Port Number(s): | show 🗑
|
||||
show | 22
🗑
|
||||
Telnet Port Number(s): | show 🗑
|
||||
show | 25
🗑
|
||||
show | 49
🗑
|
||||
DNS Port Number(s): | show 🗑
|
||||
show | 80
🗑
|
||||
Kerberos Port Number(s): | show 🗑
|
||||
show | 110
🗑
|
||||
IMAP Port Number (s): | show 🗑
|
||||
SSL and HTTPS Port Number(s): | show 🗑
|
||||
show | 636
🗑
|
||||
L2TP Port Number(s): | show 🗑
|
||||
PPTP Port Number(s): | show 🗑
|
||||
show | 3389
🗑
|
||||
show | Confidentiality, Integrity, Availablility
🗑
|
||||
show | Attacker must have already gained access to the system.
🗑
|
||||
show | Sting of code that cannot automatically spread from one computer to another, but can spread from file to file.
🗑
|
||||
show | Interaction from a user.
🗑
|
||||
show | Replication mechanism, activation mechanism and an objective.
🗑
|
||||
How will a stealth virus attempt to avoid detection? | show 🗑
|
||||
What might a multipartite virus attempt? | show 🗑
|
||||
What can a hoax create? | show 🗑
|
||||
Detrimental effects of a hoax virus: | show 🗑
|
||||
How to most virus' spread? | show 🗑
|
||||
How should you prevent the spread of virus'? | show 🗑
|
||||
show | Worm
🗑
|
||||
It uses a network to send copies of itself to other nodes and it may do so without any user intervention: | show 🗑
|
||||
It can autonomously replicate itself across a network: | show 🗑
|
||||
Malicious code that mimics a legitimate program in order to steal sensitive data. | show 🗑
|
||||
show | Worm self replicates while a Trojan Horse does not.
🗑
|
||||
Give an example of a Trojan: | show 🗑
|
||||
Will most likely open a backdoor on a system: | show 🗑
|
||||
What can help mitigate Trojan threats? | show 🗑
|
||||
A malicious attack that is set off by a specific event, date or time: | show 🗑
|
||||
show | Always has a data or time component
🗑
|
||||
Give an example of a logic bomb: | show 🗑
|
||||
show | An attack executes ona system every three months.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
jsowers105@aol.com
Popular Computers sets