30 câu hỏi
The first computer incident-response team is affiliated with what university?
Massachusetts Institute of Technology
Carnegie-Mellon University
Harvard University
California Technical University
In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
some
one
every
Almost
A Vietnamese name of a router is…
Bộ định tuyến
Bộ chia mạng
Bộ phát tín hiệu
Thiết bị kết nối
The first computer incident-response team is affiliated with what university?
Massachusetts Institute of Technology
Carnegie-Mellon University
Harvard University
California Technical University
In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
some
one
every
Almost
What port does FTP use?
20 and 21
22
23
25
Compare bit and bytes
1 byte = 8 bits
1 byte = 32 bits
8 byte = 1 bits
1 byte = 4 bits
A T1 line sends data at what speed?
100Mbps
1.54Mbps
155Mbps
56.6Kbps
An intrusion detection system is an example of which of the following?
Proactive security
Perimeter security
Hybrid security
Good security practices
Which of the following is not a valid IP address?
127.0.0.1
295.253.254.01
127.256.5.2
245.200.11.1
The –t instructs the ping utility to keep sending packets until explicitly told......... stop
to stop
to be stopped
Relational databases are based on relations between various tables. The structure includes tables, primary and …, and relations.
private keys
foreign keys
titles
In 2014 the U.S. Department of Justice was able to temporarily shut down communication with the command and control computers; then in 2015 the FBI announced a reward of $3 million for information leading to the capture of … for his alleged involvement with Gameover ZeuS
Evgeniy Bogachev
Roger B. Taney
Sung-Mo Kang
Kim Seung Eock
Doing password cracking is easiest when one can actually … to a machine.
get physical access
install virus
set up policies
What kind of cable has speed up to 16MHz or 100Mbps (megabits per second) and uses for voice transmissions?
Category 7
Category 5
Category 3
Category 6
What kind of cable has 1000Mbps (some get 10Gbps) speed and is a most common type of network cable?
Category 3
Category 6
Category 1
Category 6a
What other way can a virus scanner work?
By blocking files that copy themselves.
By blocking all unknown files.
By looking at files for virus-like behavior.
Before you can build a defense for a network you need what?
Appropriate security clearance
A clear picture of the dangers that are protected against
To complete this textbook
The help of an external consultant
… simply monitors traffic, looking for suspicious activity that might indicate an attempted intrusion
An IPS
A firewall
An IDS
A proxy
If you wish to view items that have been removed from a website, what is the best way to do that?
Use Nessus
Use Nmap
Use www.archive.org
What is happening at this point is that this single machine is ..........pinging away at the target machine.
continual
continually
continuous
What common tools used for Dos mentioned in “Computer Security Fundamentals”?
TNF and Stacheldrahts
TFN and Stacheldraht
FTN and Stacheldrahd
NTF and Stacheldragh
Vince Cerf invented what?
The World Wide Web
TCP
The first computer virus
Internet addresses of the form www.chuckeasttom.com are called what?
User-friendly web addresses
Uniform resource locators
User-accessible web addresses
Uniform address identifiers
A very popular tool for cracking Windows passwords is .... It is based on an understanding of how Windows passwords work.
OphCrack
Nessusn 2
MBSA
............. from Chapter 2 that typing in ping /? will show you all the options for the ping command.
Remember
Recall
~ Mention
By now you are aware, in a .......... way, of the dangers of the Internet, and you have explored a few basic rules for protection on the Internet.
generally
general
generalize
generalization
What kind of connection type has 64 Kbps speed?
DS0
T1
T3
ISDN
Every technology has limits; if you can exceed those limits, then you can take........
the system
the system offline
the system online
the offical system
What kind of cable has speed up to 20MHz/100Mbps and uses for Data lines, Ethernet networks?
Category 3
Category 4
Category 1
Category 6a
