The type of security control that makes use of Firewalls is _______.
administrative
physical
technical
clerical
The agents used in a Distributed Denial of Service attack are called ________.
zombies
vampires
werewolves
smurfs
Ping scans and port scans are tools used for an attack method called ___________.
repudiation
reconnaissance
masquerading
denial of service (DoS)
The _________ attack method modifies the IP header to indicate that there is more data than there actual is.
ping of death
SYN flood
smurf
land.c
The component of network security that ensures that data being sent or received cannot be read by unauthorized users is ________.
data integrity
data confidentiality
data and system availability
data and user authentication
The component of network security that ensures that data being sent or received has not been corrupted or modified in transit is ________.
data integrity
data confidentiality
data and system availability
data and user authentication
An external menace to a system or its design is called a(n) _______.
vulnerability
threat
risk
exploit
In a masquerade attack, what does an attacker steal when pretending to come from a trusted host?
account identification
IP address
User Group
User password