FBLA Cyber Security – Flashcards

Unlock all answers in this set

Unlock answers
question
Packet Filtering or Packet Purity
answer
analyzed against a set of filters. That make it though the filters are sent to the requesting system and others are discarded
question
Proxy
answer
Firewalls in this case assume the role of a recipient and in turn sends it to the node that requested the information
question
Stateful Inspection
answer
Compares certain key parts of the packet to a database of trusted information
question
IP Addresses
answer
Blocks certain IP addresses or a range of IP addresses
question
Protocols
answer
Decided which of the systems can allow or have access
question
Ports
answer
Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers.
question
Keywords
answer
will block any website that has to deal with certain predetermined keywords
question
IP
answer
Internet Protocol. The main delivery system for information over the Internet
question
TCP
answer
a protocol developed for the internet to get data from one network device to another
question
HTTP
answer
Hyper Text Transfer Protocol
question
FTP
answer
Files Transfer Protocol. Used to upload or download files
question
UDP
answer
User Datagram Protocol. Used for information that requires no response. For example streaming audio or video
question
ICMP
answer
Internet Control Message Protocol. Used by a router to exchange information with other routers
question
SMTP
answer
Simple Mail Transport Protocol. Used to send text based information, email
question
SNMP
answer
Simple Network Management Protocol. Used to collect system information from a remote computer
question
Telnet
answer
used to preform commands on a remote computers
question
Remote Login
answer
When someone connects to a computer via the Internet.
question
Application backdoor
answer
Hidden access that provides some level of control of the program
question
SMTP Session Hijacking
answer
by gaining access to a list of e mail addresses a person can send spam to thousands of users
question
Operating System Bugs
answer
operating systems backdoors.
question
E-mail bombs
answer
Large quantity of bulk e-mail that overwhelms an e-mail server preventing user access.
question
Macros
answer
tools that allow a user to program repetitive tasks into the computer;s memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
question
spam
answer
unwanted e-mail (usually of a commercial nature sent out in bulk)
question
Redirect bombs
answer
Hackers can use ICMP to change the path information take by sending it a different router.
question
Source Routing
answer
Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination.
question
Proxy Server
answer
a server that all computers on the local network have to go through before accessing information on the Internet.
question
Trojan Horses
answer
A program advertised as performing one activity but actually doing something else.
question
Worms
answer
infectious malware spreading without user interaction
question
Malware
answer
Software that is harmful or destructive, such as viruses and worms.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New