Software shields certain applications against behaviors commonly exhibited by intrusions


  • Q57:

    Which of the following sequence of events best describes an online intrusion? A) Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit. B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker. C) A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device. D) None of the above.

    Software shields certain applications against behaviors commonly exhibited by intrusions
  • Q58:

    __________ are standalone programs that masquerade as useful utilities or applications.

  • Q59:

    Once you have installed antivirus software, you don't typically need to keep it running full time in the background.

  • Q60:

    A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. A) address spoofing exploit B) online intrusion C) brute force attack D) rogue antivirus

  • Q61:

    A(n) __________ pings a packet of data to a port in order to see if that port is open or not. A) rootkit B) port scan C) virus signature D) heuristic analysis

  • Q63:

    Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? A) Network router B) Personal firewall C) Hardware that uses NAT (network address translation) D) All of the above

  • Q64:

    Hackers can use ports to communicate with devices in botnets.

  • Q65:

    A(n) _____________ is a hacker's LAN server that is designed to look like a legitimate Wi-Fi hotspot.

  • Q66:

    A botnet has a server that is controlled by hackers.

  • Q67:

    If you suspect that your computer might be infected by a zero-day exploit, launching a(n) _______________ with a product such as Malwarebytes might identify the infection. A) on-demand scan B) rootkit C) botnet D) DDoS

Home

My Library

  • You don't have any courses yet.

  • You don't have any books yet.

  • You don't have any Studylists yet.

  • You haven't viewed any documents yet.

Discovery

  • Fanshawe College
  • Seneca College
  • University of Guelph
  • Concordia University
  • Laurentian University
  • York University
  • The University of Western Ontario
  • McGill University
  • University of Waterloo
  • University of Ontario Institute of Technology
  • NorQuest College
  • University of Toronto
  • Wilfrid Laurier University
  • University of Ottawa
  • McMaster University

    • Financial Reporting 1 (ACCT 6010)
    • Science Fiction (Ceng 503)
    • Fluid Mechanics I (Maae 2300)
    • Business Finance II (04-72-271)
    • Biology (Grade 11)
    • Introduction to Psychology I (PS101)
    • Human Resource Management (HRM72105)
    • Principles of Microeconomics (ECON 103)
    • Human Resource Planning (HRMT70007)
    • Chemistry for Engineering Students (Chem 1101)
    • Introduction to Biochemistry (BIOC 2580)
    • World of Chemistry (CHEM 181)
    • Business Law (BLAW 300)
    • Systems Studies III (SMS416)
    • Human Resource Management (HRM 5003)
    • Foundations of Canadian Law (Gs/Law 6502)
    • Language and Culture (Anth 354)
    • Business Mathematics (BMAT 230)
    • Advanced Management Accounting (IAF841)
    • Critical Thinking (SSH105)
    • Mechanics (203-NYA-05)
    • Principles of Sociology (SOC1101)
    • Exploration of Professional Nursing Practice (Nurs 250)
    • Lab skills PSW (PSHS 105)
    • Advance taxation (6720)
    • Collaborative Leadership (BUSI2000U)
    • Java Programming (Comp228)
    • Fitness and Wellness (Hkr 1000)
    • Life: Health and Well-Being F (Frhd1100)
    • Nursing Practice I (NSE 12A/B)
    • Organizational Behaviour (orgs 2100)
    • Popular Music after 1945 (Muar 392)
    • Introduction to Personality (Psyc 332)
    • The Psychology of Pain (Psyc 302)
    • Greek Civilization (CLAS 1P91)
    • Introductory Pharmacology and Therapeutics (Pharmacology 2060A/B)
    • Applied Calculus I (Sc/Math 1013)
    • economics (-)
    • English 10 (-)
    • Perspectives in Aging (HLSC4807U)
    • English (ENG4U1)
    • Linear Methods I (MATH 211)
    • Mathematics (Grade 11)
    • Essential Communication Skills (COMM 19999)
    • Animal Behaviour (Biol 321)

    • NFDN 2004 Assignment 1 - Teaching Plan 2019
    • Chapter 1-Thinking Critically with Psychological Science
    • Psych 104 Notes - I wrote them based on the slides and the textbook...
    • Midterm Exam October 2014, Questions and answers
    • Midterm 11 October 2017 - Summary Of Midterm And What Will Be On It
    • Psych 104 Notes
    • Lecture notes, lectures 10 - Sociolinguistics
    • Psych 1xx3 Modules summary
    • ECON 101 - Summary Principles Of Microeconomics
    • Chapter 1 - Introduction to Psychology
    • Chapter 1 - Summary Managing Performance Through Training and Development
    • Project Charter (The Savard House)
    • Brant Freezer Case
    • Lecture notes, lecture 3 - Inflammation and Overview of Immune System
    • Lecture notes, lecture Full Course Lecture Notes - 145 pages of detailed notes (Ian Restall)
    • Employment and Labour Law - Summary - Chapter 5
    • CCNA 1 v7 Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers
    • chapter 2 multiple choice Intro to marketing
    • Bill Nye cells video worksheet Answers
    • MCQ Product design - exam
    • CO12101 E IP06 Solution
    • FNCE-Time Value of Money The Buy Versus Rent Decision
    • Two new software projects are proposed to a young
    • Patient Safety - Notes
    • Assignemnt 5 MSTM 4050 - assignment
    • P3-5B - These mirror exactly exam questions
    • SBAR Examples & Case Studies
    • De qué forma incidiría nuestra forma de manejar nuestra propia identidad digital en la manera en la que proyectamos nuestra personalidad y mostramos nuestra forma de ser
    • Ionic Bonding Gizmo Answers
    • Martin - Egg and Sperm notes
    • 23. Wrap-up - this is 302 psychology paper notes, researchpsy
    • 22. Happiness - Copy - this is 302 psychology paper notes, research n
    • 20. Psychology of Social Media
    • 21. Psychology of Conspiracy Theories
    • 8. Melzack, 1992 (Phantom limb pain review)
    • CLAS 1P95 Greek Myth Essay Gaia
    • Modelo - USEA PARA Antescedentes
    • Paper - Arquitectura Centrada en Web
    • Plantilla DE Informe Estad 2022
    • Sílabo de Emprendimiento para el Desarrollo Sostenible
    • Informe- Psicologia DEL Desarrollo
    • Poetry English - This is a poem for one of the year 10 assignments
    • Johnstone 11e 05 SM Final
    • ANTH 103 F22 Castillo Final
    • MANA 445 Fall 2022 Course outline

  • Psychology
  • Introduction to Corporate Finance WileyPLUS Next Gen Card
  • Behavioral Neuroscience
  • Cognitive Psychology
  • Child Psychology
  • Business Law in Canada
  • MKTG
  • Intermediate Accounting
  • Psychology : Themes and Variations
  • Business-To-Business Marketing
  • Instructor's Resource CD to Accompany BUSN, Canadian Edition [by] Kelly, McGowen, MacKenzie, Snow
  • Lehninger Principles of Biochemistry
  • Business Essentials
  • Organizational Behaviour
  • Bioethics: Principles, Issues, and Cases

Software shields certain applications against behaviors commonly exhibited by intrusions

1. Whichofthefollowingtermswouldbestmatchthisdefinition:Transformsamessageordatafileinsuchawaythat

its contents are hidden from unauthorized readers.

a. authentication

b. encryption

c. ciphertext

d. decryption

ANSWER: b

2. Anoriginalmessageorfilethathasnotyetbeenencryptedisreferredtoasciphertext.

a. True

b. False

ANSWER: False

3. Acryptographic________isaword,number,orphrasethatmustbeknowntoencryptordecryptdata.

ANSWER: key

4. Therearevariousencryptionmethods,but__________istheencryptionstandardcurrentlyusedworldwide.

a. AES

b. DDoS

c. IMSI

d. TLS

ANSWER: a

5. Acryptographic__________isaprocedureforencryptionordecryption.

a. firewall

b. ciphertext

c. key

d. algorithm

ANSWER: d

6. Whichofthefollowingisnotanexampleofanauthenticationprotocol?

a. password

b. PINs

c. fingerprintscanner

d. alloftheabove

ANSWER: d

CengageLearningTesting,Powered byCogneroPage1

Name: Class: Date:

Unit 07 Digital Security

What software shields certain applications against behaviors commonly exhibited by intrusions?

Anti-exploit software shields certain applications against behaviors commonly exhibited by intrusions. A(n) port scan pings a packet of data to a port in order to see if that port is open or not. A network utility called Netstat produces a detailed list of open ports on a device.

What is the best defense against malware infection?

Here's a seven-step plan..
Only Use Trusted Antivirus and Malware Software..
Configure Regular Scans and Monitor Settings..
Always Update Your Operating System..
Rely Only On Secure Networks (Encrypted).
Employ Browser Common Sense..
Keep a Tight Grip on Your Personal Information..
Stay Up-to-Date on the Latest Attacks..

Which software is designed to detect prevent and remove malicious?

Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.

What is software that is intended to damage or disable?

Software designed to destroy, damage, disable, or gain unauthorized access to any computer system, software, or electronic data. Malware is an abbreviation of the term malicious software and is also known as malicious code.