Security Study Guide
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | 20 and 21
🗑
|
||||
SSH Port Number(s): | show 🗑
|
||||
Telnet Port Number(s): | show 🗑
|
||||
show | 25
🗑
|
||||
TACACS Port Number(s): | show 🗑
|
||||
show | 53
🗑
|
||||
show | 80
🗑
|
||||
show | 88
🗑
|
||||
POP3 Port Number(s): | show 🗑
|
||||
IMAP Port Number (s): | show 🗑
|
||||
show | 443
🗑
|
||||
show | 636
🗑
|
||||
L2TP Port Number(s): | show 🗑
|
||||
show | 1723
🗑
|
||||
show | 3389
🗑
|
||||
What is CIA? | show 🗑
|
||||
A prerequisite for privilege escalation to occur: | show 🗑
|
||||
show | Sting of code that cannot automatically spread from one computer to another, but can spread from file to file.
🗑
|
||||
A virus requires: | show 🗑
|
||||
What are 3 characteristics of a virus? | show 🗑
|
||||
show | Masking itself applications by attaching itself to the boot sector of a hard drive.
🗑
|
||||
show | Infect boot sector, executable files, destroy application files.
🗑
|
||||
What can a hoax create? | show 🗑
|
||||
show | User are tricked into changing system configurations and technical support resources are consumed by increased user calls.
🗑
|
||||
show | EMail
🗑
|
||||
How should you prevent the spread of virus'? | show 🗑
|
||||
show | Worm
🗑
|
||||
It uses a network to send copies of itself to other nodes and it may do so without any user intervention: | show 🗑
|
||||
It can autonomously replicate itself across a network: | show 🗑
|
||||
show | Trojan
🗑
|
||||
show | Worm self replicates while a Trojan Horse does not.
🗑
|
||||
Give an example of a Trojan: | show 🗑
|
||||
show | Trojan
🗑
|
||||
What can help mitigate Trojan threats? | show 🗑
|
||||
show | Logic Bomb
🗑
|
||||
How does a logic bomb differ from a worm? | show 🗑
|
||||
Give an example of a logic bomb: | show 🗑
|
||||
Give an example of a logic bomb: | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
jsowers105@aol.com
Popular Computers sets