FBLA Cyber Security – Flashcards
29 test answers
Unlock all answers in this set
Unlock answers 29question
Protocols
answer
Decided which of the systems can allow or have access
Unlock the answer
question
Ports
answer
Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers.
Unlock the answer
question
Keywords
answer
will block any website that has to deal with certain predetermined keywords
Unlock the answer
question
IP
answer
Internet Protocol. The main delivery system for information over the Internet
Unlock the answer
question
TCP
answer
a protocol developed for the internet to get data from one network device to another
Unlock the answer
question
HTTP
answer
Hyper Text Transfer Protocol
Unlock the answer
question
FTP
answer
Files Transfer Protocol. Used to upload or download files
Unlock the answer
question
UDP
answer
User Datagram Protocol. Used for information that requires no response. For example streaming audio or video
Unlock the answer
question
ICMP
answer
Internet Control Message Protocol. Used by a router to exchange information with other routers
Unlock the answer
question
SMTP
answer
Simple Mail Transport Protocol. Used to send text based information, email
Unlock the answer
question
SNMP
answer
Simple Network Management Protocol. Used to collect system information from a remote computer
Unlock the answer
question
Telnet
answer
used to preform commands on a remote computers
Unlock the answer
question
Remote Login
answer
When someone connects to a computer via the Internet.
Unlock the answer
question
Application backdoor
answer
Hidden access that provides some level of control of the program
Unlock the answer
question
SMTP Session Hijacking
answer
by gaining access to a list of e mail addresses a person can send spam to thousands of users
Unlock the answer
question
Operating System Bugs
answer
operating systems backdoors.
Unlock the answer
question
E-mail bombs
answer
Large quantity of bulk e-mail that overwhelms an e-mail server preventing user access.
Unlock the answer
question
Macros
answer
tools that allow a user to program repetitive tasks into the computer;s memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Unlock the answer
question
spam
answer
unwanted e-mail (usually of a commercial nature sent out in bulk)
Unlock the answer
question
Redirect bombs
answer
Hackers can use ICMP to change the path information take by sending it a different router.
Unlock the answer
question
Source Routing
answer
Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination.
Unlock the answer
question
Proxy Server
answer
a server that all computers on the local network have to go through before accessing information on the Internet.
Unlock the answer
question
Trojan Horses
answer
A program advertised as performing one activity but actually doing something else.
Unlock the answer
question
Worms
answer
infectious malware spreading without user interaction
Unlock the answer
question
Malware
answer
Software that is harmful or destructive, such as viruses and worms.
Unlock the answer