Match each term with the correct statement below.

A. used between network computers to verify the authenticity of the communication.
B. provides information about all kinds of security threats.
C. a program that endlessly replicates on the same computer, or that sends itself to many other computers on a network.
D. might take the form of simply flooding a system with more packets than it can handle.
E. software that reports back information-to an attacker or an advertiser, for example-about that computer user's activities.
F. used by attackers to associate IP address information with account and password communications.
G. command line interface that enables you to configure packet filter rules through the use of tables.
H. a list of permit and deny conditions that can be associated with a particular router interface.
I. a portion of a network that exists between two or more networks that have different security measures in place


A. digital certificate
B. National Security Institute (NSI)
C. worm
D. remote denial of service (DoS) attack
E. spyware
F. sniffer software
G. IPTables
H. access control list (ACL)
I. demilitarized zone

Computer Science & Information Technology

You might also like to view...

All of the following are web browsers EXCEPT ________

A) Chrome B) Firefox C) Linux D) Safari

Computer Science & Information Technology

Method _______ returns a new string where all leading and trailing whitespace has been removed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

 Identify the letter of the choice that best matches the phrase or definition.

A. This event property returns a number indicating the mouse button that was pressed, where0 = left, 1 = wheel or middle, and 3 = right and evt is event object for the mouse event. B. This event property returns the horizontal coordinate (in pixels) of the mouse pointer relative to the browser window. C. This event property returns the number of times the mouse button was clicked. D. This event property returns the horizontal coordinate (in pixels) of the mouse pointer relative to the document. E. This event property returns the vertical coordinate (in pixels) of the mouse pointer relative to the monitor.

Computer Science & Information Technology

For one bridge there should not be more than 4 participants in one team.

Material: ? 2-4 large buckets of Lego building bricks (2 for each team) ? Two tables that can be placed in a way that there is up to 150 cm distance between them (the width of the river) Schedule: ? 30 minutes for planning and prototyping (prototyping) ? 5 minutes for the final build from scratch (construction) ? 20 minutes for summary and discussion

Computer Science & Information Technology