The program that executes a malicious function

Identify the program that executes a malicious function of some kind when it detects certain conditions.

Group of answer choices

Multipartite virus

Logic bomb

Polymorphic virus

SYN flood

Which of the following is a typical network infrastructure defense?

Group of answer choices

Security awareness training

Workstation backup

Operating system patch

Choke point

Which of the following is a weakness of WLANs?

Group of answer choices

WPA

RF shielding

User groups

SSID beaconing

Which of the following is a typical application defense?

Group of answer choices

Security awareness training

Change detection software

IDS

Choke point

 

 

 

You are in a meeting about system security with your organization’s top management. Explain the placement and purpose of a border firewall deployment.

This popular port-scanning tool permits an attacker to find hosts via ping sweeps, probe for open TCP and UDP ports, and identify operating systems and applications. It is available for UNIX, Linux, and Windows.