1. What characteristic describes a firewall appliance?
- a network device that filters access and traffic coming into a network
- software that identifies email spam and automatically deletes or places them in a junk folder
- malicious software or code running on an end device
- applications that protect end devices from becoming infected with malicious software
2. What characteristic describes identity theft?
- software that is installed on a user device and collects information about the user
- software that identifies email spam and automatically deletes or places them in a junk folder
- the use of stolen credentials to access private data
- an attack that slows or crashes a device or network service
3. What characteristic describes spyware?
- software that is installed on a user device and collects information about the user
- the use of stolen credentials to access private data
- software that identifies email spam and automatically deletes or places them in a junk folder
- an attack that slows or crashes a device or network service
4. What characteristic describes a DoS attack?
- the use of stolen credentials to access private data
- applications that protect end devices from becoming infected with malicious software
- software that identifies email spam and automatically deletes or places them in a junk folder
- an attack that slows or crashes a device or network service
5. What characteristic describes a virus?
- applications that protect end devices from becoming infected with malicious software
- the use of stolen credentials to access private data
- malicious software or code running on an end device
- an attack that slows or crashes a device or network service
6. What characteristic describes adware?
- software that is installed on a user device and collects information about the user
- an email pretending to represent a legitimate organization asking for personal information
- a network device that filters access and traffic coming into a network
- an attack that slows or crashes a device or network service
7. What characteristic describes antivirus software?
- applications that protect end devices from becoming infected with malicious software
- a network device that filters access and traffic coming into a network
- software that identifies email spam and automatically deletes or places them in a junk folder
- malicious software or code running on an end device
8. What characteristic describes antispam?
- applications that protect end devices from becoming infected with malicious software
- software that is installed on a user device and collects information about the user
- malicious software or code running on an end device
- software that identifies email spam and automatically deletes or places them in a junk folder
9. What characteristic describes a Trojan horse?
- the use of stolen credentials to access private data
- malicious software or code running on an end device
- a network device that filters access and traffic coming into a network
- applications that protect end devices from becoming infected with malicious software
10. What characteristic describes a DoS attack?
- an attack that slows or crashes a device or network service
- malicious software or code running on an end device
- a network device that filters access and traffic coming into a network
- applications that protect end devices from becoming infected with malicious software
11. What characteristic describes phishing?
- a network device that filters access and traffic coming into a network
- an email pretending to represent a legitimate organization asking for personal information
- an attack that slows or crashes a device or network service
- applications that protect end devices from becoming infected with malicious software
12. What characteristic describes antivirus software?
- the use of stolen credentials to access private data
- an email pretending to represent a legitimate organization asking for personal information
- software that is installed on a user device and collects information about the user
- applications that protect end devices from becoming infected with malicious software