IS4560 HACKING AND COUNTERMEASURES

This class was created by Brainscape user Barbara Crable. Visit their profile to learn more about the creator.

Decks in this class (15)

IS4560 CH 1 "Evolution of Hacking"
1 which of the following represen...,
2 it is most important to obtain ...,
3 a security exposure in an opera...
10  cards
IS4560 CH 2 TCP/IP Review
1 what is the networking layer of...,
2 which of the following is not a...,
3 which of the following makes ud...
10  cards
IS4560 CH 3 Cryptographic Concepts
1 which of the following is not o...,
2 common symmetric encryption alg...,
3 a birthday attack can be used t...
13  cards
IS4560 CH 4 Physical Security
1 physical security is less impor...,
2 ________ is a common physical c...,
3 for a fence to deter a determin...
13  cards
IS4560 CH 5 Footprinting Tools and Techniques
1 what is the best description of...,
2 which of the following is the b...,
3 which of the following is not t...
10  cards
IS4560 CH 6 Port Scanning
1 ________ is a popular though ea...,
2 which of the following is the n...,
3 which of the following is an ex...
13  cards
IS4560 CHAPTER 7 Q&A
1 enumeration discovers which por...,
2 what can enumeration discover a...,
3 ________ involves increasing ac...
12  cards
IS4560 CHAPTER 8 Q&A
1 wireless refers to all the tech...,
2 ________ operates at 5 ghz a 80...,
3 ________ is a short range wirel...
10  cards
IS4560 CH 9 Hacking Web Servers
1 input validation is a result of...,
2 web applications are used to __...,
3 which of the following challeng...
9  cards
IS4560 CH 10 Trojans and Backdoors
1 viruses do not require a host p...,
2 worms are designed to replicate...,
3 ________ is designed to intimid...
14  cards
IS4560 CH 11 Malware, Worms, and Viruses
1 trojans are a type of malware a...,
2 covert channels work over a kno...,
3 which of the following is one o...
8  cards
IS4560 CH 12 Sniffers, Session Hacking, & Denial of Service Attacks
1 a dos is meant to deny a servic...,
2 sniffers can be used to a decry...,
3 session hijacking is used to ca...
10  cards
IS4560 CH 13 Linux, Live CDs, & Automated Assessment Tools
1 a dos is meant to deny a servic...,
2 sniffers can be used to a decry...,
3 session hijacking is used to ca...
10  cards
IS4560 CH 14 Incident Response
1 ________ used to define mechani...,
2 list at least three potential r...,
3 ________ is a plan that defines...
8  cards
IS4560 CH 15 Defensive Technologies
1 hids can monitor network activi...,
2 a n ________ monitors activity ...,
3 a n ________ has the ability to...
10  cards

More about
IS4560 HACKING AND COUNTERMEASURES

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Barbara Crable's IS4560 HACKING AND COUNTERMEASURES flashcards for their ITT Tech - San Bernardino, CA class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

IS4560 MIDTERM REVIEW
  • 1 decks
  • 32 flashcards
  • 1 learners
Decks: Questions 26 50, And more!
TCM Security - Practical Ethical Hacking
  • 14 decks
  • 147 flashcards
  • 4 learners
Decks: Networking Refresher Section Quiz, Introduction To Linux, Stages Of Ethical Hacking, And more!
French
  • 121 decks
  • 6695 flashcards
  • 1289 learners
Decks: Expressions 3, Vocab 68, Vocab 66, And more!
Make Flashcards