The program that executes a malicious function
Identify the program that executes a malicious function of some kind when it detects certain conditions.
Group of answer choices
Multipartite virus
Logic bomb
Polymorphic virus
SYN flood
Which of the following is a typical network infrastructure defense?
Group of answer choices
Security awareness training
Workstation backup
Operating system patch
Choke point
Which of the following is a weakness of WLANs?
Group of answer choices
WPA
RF shielding
User groups
SSID beaconing
Which of the following is a typical application defense?
Group of answer choices
Security awareness training
Change detection software
IDS
Choke point
You are in a meeting about system security with your organization’s top management. Explain the placement and purpose of a border firewall deployment.
This popular port-scanning tool permits an attacker to find hosts via ping sweeps, probe for open TCP and UDP ports, and identify operating systems and applications. It is available for UNIX, Linux, and Windows.

