Match each item with a statement below.

A. A number-addressed channel created for communication to and from services and processes.
B. A piece of malware constructed to log every stroke a user types on the keyboard.
C. Conducted outside the organization's network security border.
D. Compares the documentation with the architecture to ensure accuracy and reliability of an environment.
E. Manages every aspect of a computer, including resource allocation, data access, and user authentication.
F. Conducted by an intruder who already has existing information about the system or the infrastructure.
G. Conducted within the organization's security border.
H. A utility that monitors and captures network activity, enabling the owner of the utility to gain an understanding of the amount, frequency, and type of communication occurring on a network.
I. Conducted with no prior knowledge of the system or infrastructure that is being tested.


A. network port
B. key logger
C. external testing
D. security auditing
E. operating system
F. white box testing
G. internal testing
H. network sniffer
I. black box testing

Computer Science & Information Technology

You might also like to view...

To print the current Web page, select the _____ menu, then select Print.

A. File B. View C. Output D. Edit

Computer Science & Information Technology

S/PDIF is a type of audio port

Indicate whether the statement is true or false

Computer Science & Information Technology

Match each of the following terms to its definition:I.switchII.firewallIII.routerIV.bridgeV.packetA.data broken into a small segment with an address to which it is sentB.makes decisions as to where data are to be sent and rebroadcasts them to the appropriate nodeC.software or hardware that prevents unauthorized entry to a networkD.sends data between different collision domains on a single networkE.device that sends information between two networks

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the first step in the boot process?

A. The BIOS is activated. B. The BIOS checks that all devices are operational. C. The OS is loaded into RAM. D. Configuration and customization settings are checked.

Computer Science & Information Technology