1. • vishing
• phishing
• phishing
2. • by phone
3. • Trojan horse
4. • exploits vulnerabilities with the intent of propagating itself across a network
5. • SYN flooding
3.
4.
5.
6. • popups
7. • spam
8. • acceptable use
9. • Only after a virus is known can an anti-virus update be created for it.
7.
8.
9.
10 • When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
• Even with anti-spam software installed, users should be careful when opening e-mail attachments.
11. • appliance-based
12. • DMZ
13. • Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
14. • internal
15. • to prevent outside intruders from attacking the router through the Internet
16. • Internet access can be denied for specific days and times.
17. • a large corporate environment
16.
17.
18. • It identifies missing security updates on a computer.
19. • Disable the wireless network when a vulnerability analysis is being performed.
20. • a change of the default IP address
21. • It requires that packets coming into the router be responses to internal host requests.
20.
21.
Tidak ada komentar:
Posting Komentar