Podcast
Questions and Answers
Match the following external threats with their descriptions:
Match the following external threats with their descriptions:
Viruses, worms, and Trojan horses = Malicious software that can infect a system and replicate itself Spyware and adware = Software that gathers information about a person or organization without their knowledge Zero-day attacks = Exploits targeting vulnerabilities that are unknown to the software vendor Denial of service attacks = Flooding a network or server with traffic to disrupt normal operation
Match the following internal threats with their descriptions:
Match the following internal threats with their descriptions:
Lost or stolen devices = Devices containing sensitive information that are misplaced or taken by unauthorized individuals Accidental misuse by employees = Unintentional actions by staff that compromise security Malicious employees = Insiders who intentionally harm the organization's security Data interception and theft = Unauthorized access to and theft of confidential information
Match the following security solutions with their components:
Match the following security solutions with their components:
Antivirus and antispyware software = Software installed on end devices to detect and remove malware Firewall filtering = Technology used to block unauthorized access to a network Dedicated firewall system = A separate device specifically designed to protect a network Intrusion prevention systems (IPS) = Security measures to detect and block potential threats in real-time
Match the following network security components with their functions:
Match the following network security components with their functions:
Signup and view all the answers