CIS 123 Written assignment 7 (Chapters 13, 14)
- What is the purpose of an ASP? (1 pt)
- What is the purpose of an SLA? (1 pt)
- What is the purpose of an RFP? (1 pt)
- As it relates to computer security, what is a honeypot? (1 pt)
- As it relates to computer security, what is a tarpit? (1 pt)
- As it relates to computer security, what is a Trojan horse? (1 pt)
- Why is a DDoS attack harder to stop than a DoS attack? (1 pt)
- As it relates to computer security, how does a worm differ from a Trojan horse and a virus? (1 pt)
- As it relates to computer security, what type of threat does a firewall stop? (1 pt)
- As it relates to computer security, what is a zombie computer? (1 pt)
- How does encryption help protect your information? (1 pt)
- How are private key and symmetric encryption related? (1 pt)
- How are public key and asymmetric encryption related? (1 pt)
- Why is private key encryption called "private key" and "symmetric"? (1 pt)
- Why is public key encryption called "public key" and "asymmetric"? (1 pt)