Match each item with a statement below.
A. any activity that represents a potential danger or attack on a system or network
B. any type of network service that permits users elsewhere on a network to use the network to log on to a system as if they were attached locally while operating remotely
C. an ICMP Echo-based operation used to locate active devices on a network
D. the process of examining the "footprints" that an attacker leaves behind
E. a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities
F. a manager system in a DDoS attack
G. an IP attack technique whereby an impostor takes over an ongoing communications session between a client and server
H. a document that represents the concrete manifestation of an organization's requirements for security practices, rules, and procedures
I. a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made to appear part of a larger network
A. threat
B. remote logon service
C. PING sweep
D. computer forensics
E. port scanner
F. handler
G. session hijacking
H. security policy
I. honeypot
You might also like to view...
NumberFormat method ________ returns a String representation of its argument in the specified numeric format.
a. number b. toNumeric c. format d. numeric
Match the following features with their description:
I. section break A. switch from one setting to another II. toggle B. text or graphic that displays behind text III. watermark C. forces the next part of a document onto a new page IV. hard page break D. when text automatically continues to the next page V. soft page break E. marker that divides a document
PhoneGap adds a line of code to the head of the page that must be included for the app to function correctly.
Answer the following statement true (T) or false (F)
Certificates that you create yourself are considered ________
Fill in the blank(s) with correct word