FBLA Cyber Security | 100 Actual Questions And Answers 100% Correct |
Packet Filtering or Packet Purity - Answer analyzed against a set of filters. That make it though the filters are sent to the requesting system and others are discarded
Stateful Inspection - Answer Compares certain key parts of the packet to a database of trusted information
IP Addresses - Answer Blocks certain IP addresses or a range of IP addresses
Protocols - Answer Decides which of the systems can allow or have access
Ports - Answer Blocking or disabling ports of severs that are connected.Maintain the kind of data flow you want to see and close down possible entry points for hackers.
Keywords - Answer will block any website that has to deal with certain predetermined keywords
IP - Answer Internet Protocol. The main delivery system for information over the Internet
TCP - Answer a protocol developed for the internet to get data from one network device to another
HTTP - Answer Hyper Text Transfer Protocol
FTP - Answer Files Transfer Protocol. Used to upload or download files
UDP - Answer User Datagram Protocol. Used for information that requires no response. For example streaming audio or video
- / 2
ICMP - Answer Internet Control Message Protocol. Used by a router to exchange information with other routers
SMTP - Answer Simple Mail Transport Protocol. Used to send text based information, email
SNMP - Answer Simple Network Management Protocol. Used to collect system information from a remote computer
Telnet - Answer used to preform commands on a remote computers
Remote Login - Answer When someone connects to a computer via the Internet.
Application backdoor - Answer Hidden access that provides some level of control of the program
SMTP Session Hijacking - Answer by gaining access to a list of e mail addresses a person can send spam to thousands of users
Operating System Bugs - Answer operating systems backdoors.
E-mail bombs - Answer Large quantity of bulk e-mail that overwhelms an e- mail server preventing user access.
Macros - Answer tools that allow a user to program repetitive tasks into the computer;s memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
spam - Answer unwanted e-mail (usually of a commercial nature sent out in bulk)
Redirect bombs - Answer Hackers can use ICMP to change the path information take by sending it a different router.
- / 2