What is the purpose of virus scanners?
To prevent a virus from infecting the system
Virus scanners search for the signature of a known virus.
Name the two methods by which virus scanners work.
Signature matching uses a list of known virus definitions, while behavior matching looks for typical virus behaviors.
What are the two types of virus scanners based on their operation?
Ongoing scanners run constantly in the background, while on-demand scanners run only when launched.
What does behavior matching in virus scanners attempt to detect?
These behaviors are typical indicators of a virus.
What is the role of a firewall?
A barrier between your network and the outside world
Firewalls filter packets based on size, source IP, protocol, and destination port.
Name the types of firewalls mentioned.
Each type serves different functions in network security.
What is a dual-homed host in firewall configurations?
Installed on a server with at least two network interfaces
This setup allows communication between systems inside and outside the firewall without direct interaction.
What does antispyware do?
Scans for spyware
Antispyware checks for known spyware files and maintains updated definitions.
What is the function of intrusion-detection software (IDS)?
Inspects all inbound and outbound port activity
IDS scans for patterns that might indicate an attempted break-in.
Differentiate between misuse detection and anomaly detection in IDS.
Misuse detection relies on known patterns, while anomaly detection identifies deviations from normal access patterns.
What are the two types of IDS systems based on their response?
Passive systems log information, while reactive systems take action against suspicious activity.
What is PAP in authentication protocols?
Password Authentication Protocol
PAP is the simplest form of authentication and is the least secure.
What does VPN stand for?
Virtual Private Network
VPNs create a virtual connection through the Internet with encrypted packets.
What is the purpose of WEP in WiFi security?
Uses the stream cipher RC4 to secure data
WEP employs a 40-bit key with a 24-bit initialization vector for encryption.
What is the main feature of WPA2?
Uses the Advanced Encryption Standard (AES)
WPA2 provides data confidentiality, origin authentication, and integrity for wireless frames.
True or false: WPA3 requires attackers to interact with your Wi-Fi for every password guess they attempt.
TRUE
This feature makes brute-force attacks less likely to succeed.