IT-6310 - Network Security oed answer key

Showing 1 to 20 of 30 total answers.

#IT-6310
Awesome StudentQuestion • Network Security

It disguises as useful software.

Answer

trojan horse

#IT-6310
Awesome StudentQuestion • Network Security

This is an improved version of WEP.

Answer

WPA

#IT-6310
Awesome StudentQuestion • Network Security

This is a networking infrastructure company.

Answer

CISCO

#IT-6310
Awesome StudentQuestion • Network Security

This is data being transported on a network.

Answer

traffic

#IT-6310
Awesome StudentQuestion • Network Security

It uses code to access operating systems and software.

Answer

structured attacks

#IT-6310
Awesome StudentQuestion • Network Security

One example is when an employee intends to cause damage.

#IT-6310
Awesome StudentQuestion • Network Security

It uses available resources, such as passwords or scripts.

#IT-6310
Awesome StudentQuestion • Network Security

If the network isn't a line or a point: it's a _____________.

#IT-6310
Awesome StudentQuestion • Network Security

It is a self-replicating program that is harmful to networks.

#IT-6310
Awesome StudentQuestion • Network Security

These are created with malicious intent and sent by attackers.

#IT-6310
Awesome StudentQuestion • Network Security

This is when the user damages data or equipment unintentionally.

#IT-6310
Awesome StudentQuestion • Network Security

It was the first generation security standard for wireless network.

#IT-6310
Awesome StudentQuestion • Network Security

This is a way of protecting a computer from intrusion through the ports.

#IT-6310
Awesome StudentQuestion • Network Security

Software designed to detect, disable, and remove viruses, worms, and Trojans.

#IT-6310
Awesome StudentQuestion • Network Security

This refers to the events or attacks that steal, damage, or destroy equipment.

#IT-6310
Awesome StudentQuestion • Network Security

It could be exploited because of an encryption key that was vulnerable to decoding.

#IT-6310
Awesome StudentQuestion • Network Security

It helps keep data and equipment safe by giving only the appropriate people access.

#IT-6310
Awesome StudentQuestion • Network Security

Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.

#IT-6310
Awesome StudentQuestion • Network Security

A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).

Page 1 of 2