FBLA Cyber Security | 100 Actual Questions And Answers 100% Correct | 2024 Packet Filtering or Packet Purity - Answer analyzed against a set of filters. That make it though the filters are sent to the requesting system and others are discarded Stateful Inspection - Answer Compares certain key parts of the packet to a database of trusted information IP Addresses - Answer Blocks certain IP addresses or a range of IP addresses Protocols - Answer Decides which of the systems can allow or have access Ports - Answer Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers. Keywords - Answer will block any website that has to deal with certain predetermined keywords IP - Answer Internet Protocol. The main delivery system for information over the Internet TCP - Answer a protocol developed for the internet to get data from one network device to another HTTP - Answer Hyper Text Transfer Protocol FTP - Answer Files Transfer Protocol. Used to upload or download files UDP - Answer User Datagram Protocol. Used for information that requires no response. For example streaming audio or video ICMP - Answer Internet Control Message Protocol. Used by a router to exchange information with other routers SMTP - Answer Simple Mail Transport Protocol. Used to send text based information, email SNMP - Answer Simple Network Management Protocol. Used to collect system information from a remote computer Telnet - Answer used to preform commands on a remote computers Remote Login - Answer When someone connects to a computer via the Internet. Application backdoor - Answer Hidden access that provides some level of control of the program SMTP Session Hijacking - Answer by gaining access to a list of e mail addresses a person can send spam to thousands of users Operating System Bugs - Answer operating systems backdoors. E-mail bombs - Answer Large quantity of bulk e -mail that overwhelms an e -
mail server preventing user access. Macros - Answer tools that allow a user to program repetitive tasks into the computer;s memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected spam - Answer unwanted e -mail (usually of a commercial nature sent out in bulk) Redirect bombs - Answer Hackers can use ICMP to change the path information take by sending it a different router.
mail server preventing user access. Macros - Answer tools that allow a user to program repetitive tasks into the computer;s memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected spam - Answer unwanted e -mail (usually of a commercial nature sent out in bulk) Redirect bombs - Answer Hackers can use ICMP to change the path information take by sending it a different router.