Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Security Study Guide

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show 20 and 21  
🗑
SSH Port Number(s):   show
🗑
Telnet Port Number(s):   show
🗑
show 25  
🗑
TACACS Port Number(s):   show
🗑
show 53  
🗑
show 80  
🗑
show 88  
🗑
POP3 Port Number(s):   show
🗑
IMAP Port Number (s):   show
🗑
show 443  
🗑
show 636  
🗑
L2TP Port Number(s):   show
🗑
show 1723  
🗑
show 3389  
🗑
What is CIA?   show
🗑
A prerequisite for privilege escalation to occur:   show
🗑
show Sting of code that cannot automatically spread from one computer to another, but can spread from file to file.  
🗑
A virus requires:   show
🗑
What are 3 characteristics of a virus?   show
🗑
show Masking itself applications by attaching itself to the boot sector of a hard drive.  
🗑
show Infect boot sector, executable files, destroy application files.  
🗑
What can a hoax create?   show
🗑
show User are tricked into changing system configurations and technical support resources are consumed by increased user calls.  
🗑
show EMail  
🗑
How should you prevent the spread of virus'?   show
🗑
show Worm  
🗑
It uses a network to send copies of itself to other nodes and it may do so without any user intervention:   show
🗑
It can autonomously replicate itself across a network:   show
🗑
show Trojan  
🗑
show Worm self replicates while a Trojan Horse does not.  
🗑
Give an example of a Trojan:   show
🗑
show Trojan  
🗑
What can help mitigate Trojan threats?   show
🗑
show Logic Bomb  
🗑
How does a logic bomb differ from a worm?   show
🗑
Give an example of a logic bomb:   show
🗑
Give an example of a logic bomb:   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Computers sets