
MS Security Fundamentals Lesson 4 Vocab
Computers
11th - 12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Also known as a proxy server. Works by performing a deep inspection of application data as it traverses the firewall. Rules are set by analyzing client requests and application responses, then enforcing correct application behavior.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
an attack on the protocol used to determine a device’s hardware address (MAC address) on the network when the IP address is known.
ARP spoofing
SYn flood
buffer overflow attack
honeypot
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attack against an opening left in a functional piece of software that allows access into a system or software application without the owner’s knowledge.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attack that exploits poorly written code by injecting data into variable fields and leveraging the response to access information in the application. This attack is made possible when the application developer doesn’t limit or check the size of the data being entered in an application field.
buffer overflow attack
demilitarized zone (DMZ)
cross-site scripting (XSS) attack
sniffers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Typically considered second-generation firewall technology. Works in a similar fashion to packet-filtering firewalls, but operates at the transport and session layers of the OSI model.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By far the most common and potentially the most dangerous current attack against web users. These attacks allow attackers to bypass the security mechanisms provided by the web browser. By injecting malicious scripts into web pages, and getting users to execute them, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser.
cross-site scripting (XSS) attack
CRSF
Buffer overflow
Session Hijacking
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall configuration used to secure hosts on a network segment.
demilitarized zone (DMZ)
ARP spoofing
distributed denial-of-service (DDoS) attack
application-level firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?