Rabu, 27 Oktober 2010

MODUL 1.8 CCNA Discovery

1. vishing
phishing
pretexting
2. by phone
3. Trojan horse
4. exploits vulnerabilities with the intent of propagating itself across a network
5. SYN flooding
6. popups
7. spam
8. acceptable use
9. Only after a virus is known can an anti-virus update be created for it.
10. When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
11. appliance-based
12. DMZ
13. Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
14. internal
15. to prevent outside intruders from attacking the router through the Internet
16. Internet access can be denied for specific days and times.
17. a large corporate environment
18. It identifies missing security updates on a computer.
19. Disable the wireless network when a vulnerability analysis is being performed.
20. a change of the default IP address
21. It requires that packets coming into the router be responses to internal host requests.

Tidak ada komentar:

Posting Komentar