Question


a. auditing f. port
b. biometrics g. RBAC
c. DMZ h. signatures
d. DDoS attack i. socket
e. packet filters j. worm
1/ An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all, and normal traffic is blocked
2/ The process of recording which computers are accessing a network and what
resources are being accessed, and then recording the information in a log file
3/ Signs of possible attacks that include an IP address, a port number, and the
frequency of access attempts; an IDPS uses signatures to detect possible attacks
4/ An area in random access memory (RAM) reserved for the use of a program that "listens" for requests for the service it provides
5/ A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
6/ A network connection consisting of a port number combined with a computer's IP address
7/ An access control method that establishes organizational roles to control access to information
8/ A method of authenticating a user using physical information, such as retinal
scans, fingerprints, or voiceprints
9/ Computer files that copy themselves repeatedly and consume disk space or
other resources
10/ Hardware or software tools that allow or deny packets based on specified
criteria, such as port, IP address, or protocol.

Answer

This answer is hidden. It contains 31 characters.