??Match each correct item with the statement below. ?

A. ?A portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network's security.
B. ?A software security flaw that can allow unauthorized users to gain access to a system. Legacy systems are particularly notorious for leaving these kinds of gaps in a network's overall security net.
C. ?A type of intrusion detection that runs on a single computer, such as a client or server, to alert about attacks against that one host.
D. ?A type of intrusion prevention that runs on a single computer, such as a client or server, to intercept and help prevent attacks against that one host.
E. ?A type of intrusion detection that protects an entire network and is situated at the edge of the network or in a network's protective perimeter, known as the DMZ (demilitarized zone). Here, it can detect many types of suspicious traffic patterns.
F. ?A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world, instead of revealing the addresses of internal LAN devices.
G. ?A threat to networked hosts in which the host is flooded with broadcast ping messages.
H. ?A specification created by the NSA to define protection standards against RF emanation, which when implemented are called EmSec (emission security).
I. A program that replicates itself to infect more computers, either through network connections when it piggybacks on other files or through exchange of external storage devices, such as USB drives, passed among users.?
J. ?A program that runs independently and travels between computers and across networks. Although worms do not alter other programs as viruses do, they can carry viruses.


A. ?acceptable use policy (AUP)
B. ?backdoor
C. ?HIDS (host-based intrusion detection system)
D. ?HIPS (host-based intrusion prevention system)
E. ?NIDS (network-based intrusion detection system)
F. ?proxy service
G. ?smurf attack
H. ?TEMPEST?
I. ?virus
J. worm

Computer Science & Information Technology

You might also like to view...

In the Insert For Each In Array Loop dialog box, we can specify the ____ of values we have in our array, (2) specify a(n) ____ for one of the items in the array, and (3) specify the ____ through which we want to iterate.

A. array; generic variable name; type B. list; index; generic array name C. type; generic variable name; array D. index; generic array name; list

Computer Science & Information Technology

Display course description, total capacity and number of sections in each course, where there is more than 1 section.

What will be an ideal response?

Computer Science & Information Technology

Action queries can be tested before being run

Indicate whether the statement is true or false

Computer Science & Information Technology

From the Word start page, if you want to open a Word document that is not listed in the Recent documents list, click ________

A) Open Other Documents B) the File tab C) Computer D) the application's icon on the taskbar

Computer Science & Information Technology