15.7.2 Check Your Understanding – Identify the Security Term Answers

1. What characteristic describes a firewall appliance?

  • a network device that filters access and traffic coming into a network
  • software that identifies email spam and automatically deletes or places them in a junk folder
  • malicious software or code running on an end device
  • applications that protect end devices from becoming infected with malicious software

2. What characteristic describes identity theft?

  • software that is installed on a user device and collects information about the user
  • software that identifies email spam and automatically deletes or places them in a junk folder
  • the use of stolen credentials to access private data
  • an attack that slows or crashes a device or network service

3. What characteristic describes spyware?

  • software that is installed on a user device and collects information about the user
  • the use of stolen credentials to access private data
  • software that identifies email spam and automatically deletes or places them in a junk folder
  • an attack that slows or crashes a device or network service

4. What characteristic describes a DoS attack?

  • the use of stolen credentials to access private data
  • applications that protect end devices from becoming infected with malicious software
  • software that identifies email spam and automatically deletes or places them in a junk folder
  • an attack that slows or crashes a device or network service

5. What characteristic describes a virus?

  • applications that protect end devices from becoming infected with malicious software
  • the use of stolen credentials to access private data
  • malicious software or code running on an end device
  • an attack that slows or crashes a device or network service

6. What characteristic describes adware?

  • software that is installed on a user device and collects information about the user
  • an email pretending to represent a legitimate organization asking for personal information
  • a network device that filters access and traffic coming into a network
  • an attack that slows or crashes a device or network service

7. What characteristic describes antivirus software?

  • applications that protect end devices from becoming infected with malicious software
  • a network device that filters access and traffic coming into a network
  • software that identifies email spam and automatically deletes or places them in a junk folder
  • malicious software or code running on an end device

8. What characteristic describes antispam?

  • applications that protect end devices from becoming infected with malicious software
  • software that is installed on a user device and collects information about the user
  • malicious software or code running on an end device
  • software that identifies email spam and automatically deletes or places them in a junk folder

9. What characteristic describes a Trojan horse?

  • the use of stolen credentials to access private data
  • malicious software or code running on an end device
  • a network device that filters access and traffic coming into a network
  • applications that protect end devices from becoming infected with malicious software

10. What characteristic describes a DoS attack?

  • an attack that slows or crashes a device or network service
  • malicious software or code running on an end device
  • a network device that filters access and traffic coming into a network
  • applications that protect end devices from becoming infected with malicious software

11. What characteristic describes phishing?

  • a network device that filters access and traffic coming into a network
  • an email pretending to represent a legitimate organization asking for personal information
  • an attack that slows or crashes a device or network service
  • applications that protect end devices from becoming infected with malicious software

12. What characteristic describes antivirus software?

  • the use of stolen credentials to access private data
  • an email pretending to represent a legitimate organization asking for personal information
  • software that is installed on a user device and collects information about the user
  • applications that protect end devices from becoming infected with malicious software
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x