Friday, May 20, 2016

IT2 Final Review - Security Vocabulary

Greetings, and welcome to Seeseenayy.
Below are the answers to review questions for IT2 Security, most of which are general terminology.

Click here to test your knowledge on basic security terms:

The answers to this test are below. Click on the link below to see them.
Remember, if you need to study these terms please do not cheat. You'll only be cheating yourself!

IT2 - Security Vocab Review
A client computer connects to this to request a service. It can be set up so that it only allows certain traffic to pass through. (2 points)

  • Biometrics
  • Phishing
  • BitLocker
  • Demilitarized Zone
  • Proxy*

What are authentication tools that use physical characteristics to identify the
user. (2 points)

  • Javascript
  • Signature Files
  • Dual access
  • Biometrics*
  • Social Engineering

Which of these is strongest wireless encryption method currently
available for 802.11 networks. (2 points)

  • WPA
  • WEP
  • WPA2*
  • Proxy
  • Firewall

What is it called when the attacker pretends to represent a legitimate outside organization, such as a bank. (2 points)

  • Phishing*
  • Proxy
  • Denial of Service
  • Trojan
  • Worm

What occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information (2 points)

  • Social Engineering*
  • Proxy
  • Worm
  • Denial of Service
  • Phishing

No comments:

Post a Comment

Feel free to comment if you have a question, commendation, or concern. We love to hear your feedback!

Please do not share links to external websites if it not relevant to discussion. We reserve our right to remove any content we deem advertising.