728x90 AdSpace

  • Latest News

    IT2 Final Review - Security Vocabulary

    Greetings, and welcome to Seeseenayy.
    Below are the answers to review questions for IT2 Security, most of which are general terminology.


    Click here to test your knowledge on basic security terms: https://quizlet.com/140081649/test

    The answers to this test are below. Click on the link below to see them.
    Remember, if you need to study these terms please do not cheat. You'll only be cheating yourself!



    IT2 - Security Vocab Review
    A client computer connects to this to request a service. It can be set up so that it only allows certain traffic to pass through. (2 points)

    • Biometrics
    • Phishing
    • BitLocker
    • Demilitarized Zone
    • Proxy*



    What are authentication tools that use physical characteristics to identify the
    user. (2 points)

    • Javascript
    • Signature Files
    • Dual access
    • Biometrics*
    • Social Engineering



    Which of these is strongest wireless encryption method currently
    available for 802.11 networks. (2 points)

    • WPA
    • WEP
    • WPA2*
    • Proxy
    • Firewall



    What is it called when the attacker pretends to represent a legitimate outside organization, such as a bank. (2 points)

    • Phishing*
    • Proxy
    • Denial of Service
    • Trojan
    • Worm



    What occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information (2 points)

    • Social Engineering*
    • Proxy
    • Worm
    • Denial of Service
    • Phishing


    • Blogger Comments
    • Facebook Comments

    0 comments:

    Post a Comment

    Item Reviewed: IT2 Final Review - Security Vocabulary Rating: 5 Reviewed By: Unknown
    Scroll to Top