Network Security
Network Security: Overview
This topic covers concepts, such as, Computer and Network Security etc.
Important Questions on Network Security
Which of the following is NOT a good Web security strategy?

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

A vulnerability scanner is _____.

This hacker is someone outside computer security consulting firms that used to bug test a system before its launch, looking for exploits so they can be closed. he is called___.

Viruses that fool a user into downloading or executing them by pretending to be useful applications are also sometimes called _____.

Which is primarily the result of a thorough understanding of information about an enterprise?

This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

It is a software program designed to record ('log') every keystroke on the machine on which it runs.

These are program designed as to seem to being or be doing one thing, but actually being or doing another.

_____ is the industry standard name for the first computer virus for MS-DOS.

________ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity.

_____ is the industry standard name for the first computer virus for MS-DOS.
