Search Header Logo

MS Security Fundamentals Lesson 4 Vocab

Computers

11th - 12th Grade

Used 7+ times

MS Security Fundamentals Lesson 4 Vocab
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Also known as a proxy server. Works by performing a deep inspection of application data as it traverses the firewall. Rules are set by analyzing client requests and application responses, then enforcing correct application behavior.

application-level firewall
buffer overflow attack
Host Firewall
honey net

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

an attack on the protocol used to determine a device’s hardware address (MAC address) on the network when the IP address is known.

ARP spoofing

SYn flood

buffer overflow attack

honeypot

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack against an opening left in a functional piece of software that allows access into a system or software application without the owner’s knowledge.

backdoor attack
cross-site scripting (XSS) attack
circuit-level firewall
security policy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that exploits poorly written code by injecting data into variable fields and leveraging the response to access information in the application. This attack is made possible when the application developer doesn’t limit or check the size of the data being entered in an application field.

buffer overflow attack

demilitarized zone (DMZ)

cross-site scripting (XSS) attack

sniffers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically considered second-generation firewall technology. Works in a similar fashion to packet-filtering firewalls, but operates at the transport and session layers of the OSI model.

circuit-level firewall
denial-of-service (DoS) attack
demilitarized zone (DMZ)
strong password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By far the most common and potentially the most dangerous current attack against web users. These attacks allow attackers to bypass the security mechanisms provided by the web browser. By injecting malicious scripts into web pages, and getting users to execute them, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser.

cross-site scripting (XSS) attack

CRSF

Buffer overflow

Session Hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall configuration used to secure hosts on a network segment.

demilitarized zone (DMZ)

ARP spoofing

distributed denial-of-service (DDoS) attack

application-level firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?