IT-6310 - Network Security oed answer key
Showing 1 to 20 of 30 total answers.
#IT-6310
Awesome StudentQuestion • Network Security
It disguises as useful software.
Answer
trojan horse
#IT-6310
Awesome StudentQuestion • Network Security
This is an improved version of WEP.
Answer
WPA
#IT-6310
Awesome StudentQuestion • Network Security
This is a networking infrastructure company.
Answer
CISCO
#IT-6310
Awesome StudentQuestion • Network Security
This is data being transported on a network.
Answer
traffic
#IT-6310
Awesome StudentQuestion • Network Security
It uses code to access operating systems and software.
Answer
structured attacks
#IT-6310
Awesome StudentQuestion • Network Security
One example is when an employee intends to cause damage.
#IT-6310
Awesome StudentQuestion • Network Security
It uses available resources, such as passwords or scripts.
#IT-6310
Awesome StudentQuestion • Network Security
If the network isn't a line or a point: it's a _____________.
#IT-6310
Awesome StudentQuestion • Network Security
It is a self-replicating program that is harmful to networks.
#IT-6310
Awesome StudentQuestion • Network Security
These are created with malicious intent and sent by attackers.
#IT-6310
Awesome StudentQuestion • Network Security
This is when the user damages data or equipment unintentionally.
#IT-6310
Awesome StudentQuestion • Network Security
It was the first generation security standard for wireless network.
#IT-6310
Awesome StudentQuestion • Network Security
This is a way of protecting a computer from intrusion through the ports.
#IT-6310
Awesome StudentQuestion • Network Security
Software designed to detect, disable, and remove viruses, worms, and Trojans.
#IT-6310
Awesome StudentQuestion • Network Security
This refers to the events or attacks that steal, damage, or destroy equipment.
#IT-6310
Awesome StudentQuestion • Network Security
It could be exploited because of an encryption key that was vulnerable to decoding.
#IT-6310
Awesome StudentQuestion • Network Security
It helps keep data and equipment safe by giving only the appropriate people access.
#IT-6310
Awesome StudentQuestion • Network Security
Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.
#IT-6310
Awesome StudentQuestion • Network Security