worm
exploits vulnerabilities with theintent of propagating itself across a network
Used to combat critical network vulnerabilities
operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.
Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.
Configure routing protocol authentication.
True
Look for digital cert.
security audit
While dealing with computers in a network, threats will always emerge. The current network threats include advanced DDos attacks, botnet attacks, insecure applications, vulnerabilities in embedded systems and sophisticated viruses.
False. Trackable information will be lost if you reboot.
A botnet is a collection of compromised computers connected to the Internet (each compromised computer is known as a 'bot'). When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards based network protocols such as IRC and http.
SSH