Greetings, and welcome to Seeseenayy.
Below are the answers to review questions for IT2 Security, most of which are general terminology.
Click here to test your knowledge on basic security terms: https://quizlet.com/140081649/test
The answers to this test are below. Click on the link below to see them.
Remember, if you need to study these terms please do not cheat. You'll only be cheating yourself!
IT2 - Security Vocab Review
A client computer connects to this to request a service. It can be set up so that it only allows certain traffic to pass through. (2 points)
What are authentication tools that use physical characteristics to identify the
user. (2 points)
Which of these is strongest wireless encryption method currently
available for 802.11 networks. (2 points)
What is it called when the attacker pretends to represent a legitimate outside organization, such as a bank. (2 points)
What occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information (2 points)
Below are the answers to review questions for IT2 Security, most of which are general terminology.
Click here to test your knowledge on basic security terms: https://quizlet.com/140081649/test
The answers to this test are below. Click on the link below to see them.
Remember, if you need to study these terms please do not cheat. You'll only be cheating yourself!
IT2 - Security Vocab Review
A client computer connects to this to request a service. It can be set up so that it only allows certain traffic to pass through. (2 points)
- Biometrics
- Phishing
- BitLocker
- Demilitarized Zone
- Proxy*
What are authentication tools that use physical characteristics to identify the
user. (2 points)
- Javascript
- Signature Files
- Dual access
- Biometrics*
- Social Engineering
Which of these is strongest wireless encryption method currently
available for 802.11 networks. (2 points)
- WPA
- WEP
- WPA2*
- Proxy
- Firewall
What is it called when the attacker pretends to represent a legitimate outside organization, such as a bank. (2 points)
- Phishing*
- Proxy
- Denial of Service
- Trojan
- Worm
What occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information (2 points)
- Social Engineering*
- Proxy
- Worm
- Denial of Service
- Phishing
0 comments:
Post a Comment