Match each item with a statement below.

A. any activity that represents a potential danger or attack on a system or network
B. any type of network service that permits users elsewhere on a network to use the network to log on to a system as if they were attached locally while operating remotely
C. an ICMP Echo-based operation used to locate active devices on a network
D. the process of examining the "footprints" that an attacker leaves behind
E. a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities
F. a manager system in a DDoS attack
G. an IP attack technique whereby an impostor takes over an ongoing communications session between a client and server
H. a document that represents the concrete manifestation of an organization's requirements for security practices, rules, and procedures
I. a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made to appear part of a larger network


A. threat
B. remote logon service
C. PING sweep
D. computer forensics
E. port scanner
F. handler
G. session hijacking
H. security policy
I. honeypot

Computer Science & Information Technology

You might also like to view...

NumberFormat method ________ returns a String representation of its argument in the specified numeric format.

a. number b. toNumeric c. format d. numeric

Computer Science & Information Technology

Match the following features with their description:

I. section break A. switch from one setting to another II. toggle B. text or graphic that displays behind text III. watermark C. forces the next part of a document onto a new page IV. hard page break D. when text automatically continues to the next page V. soft page break E. marker that divides a document

Computer Science & Information Technology

PhoneGap adds a line of code to the head of the page that must be included for the app to function correctly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Certificates that you create yourself are considered ________

Fill in the blank(s) with correct word

Computer Science & Information Technology