Answer:
1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications
2.Small malware programs that download larger malware programs are called downloaders
3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards
4. Converting application messages into bits is called encoding
5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements
6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim
7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION
8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE
9. Firewall log files should be read EVERYDAY
10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file
11. IT security employees are the most difficult employees
12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.
13. In a firewall, VPN traversal reduces firewall filtering effectiveness
14. DIRECTLY-PROPAGATING WORM can spread more rapidly
15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.
16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.
17. 802.11 data link layer standards govern neither access point operation nor frame organization
18. Credit card number thieves are called CARDERS
19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY
20. Iris scanning is attractive because of its PRECISION
21. The source socket is 60.171.18.22:57707. The source is a CLIENT