2048.vn

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 1
Quiz

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 1

VietJack
VietJack
Đại họcTrắc nghiệm tổng hợp10 lượt thi
30 câu hỏi
1. Trắc nghiệm
1 điểm

The first computer incident-response team is affiliated with what university?

Massachusetts Institute of Technology

Carnegie-Mellon University

Harvard University

California Technical University

Xem đáp án
2. Trắc nghiệm
1 điểm

In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.

some

one

every

Almost

Xem đáp án
3. Trắc nghiệm
1 điểm

A Vietnamese name of a router is…

Bộ định tuyến

Bộ chia mạng

Bộ phát tín hiệu

Thiết bị kết nối

Xem đáp án
4. Trắc nghiệm
1 điểm

The first computer incident-response team is affiliated with what university?

Massachusetts Institute of Technology

Carnegie-Mellon University

Harvard University

California Technical University

Xem đáp án
5. Trắc nghiệm
1 điểm

In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.

some

one

every

Almost

Xem đáp án
6. Trắc nghiệm
1 điểm

What port does FTP use?

20 and 21

22

23

25

Xem đáp án
7. Trắc nghiệm
1 điểm

Compare bit and bytes

1 byte = 8 bits

1 byte = 32 bits

8 byte = 1 bits

1 byte = 4 bits

Xem đáp án
8. Trắc nghiệm
1 điểm

A T1 line sends data at what speed?

100Mbps

1.54Mbps

155Mbps

56.6Kbps

Xem đáp án
9. Trắc nghiệm
1 điểm

An intrusion detection system is an example of which of the following?

Proactive security

Perimeter security

Hybrid security

Good security practices

Xem đáp án
10. Trắc nghiệm
1 điểm

Which of the following is not a valid IP address?

127.0.0.1

295.253.254.01

127.256.5.2

245.200.11.1

Xem đáp án
11. Trắc nghiệm
1 điểm

The –t instructs the ping utility to keep sending packets until explicitly told......... stop

to stop

to be stopped

Xem đáp án
12. Trắc nghiệm
1 điểm

Relational databases are based on relations between various tables. The structure includes tables, primary and …, and relations.

private keys

foreign keys

titles

Xem đáp án
13. Trắc nghiệm
1 điểm

In 2014 the U.S. Department of Justice was able to temporarily shut down communication with the command and control computers; then in 2015 the FBI announced a reward of $3 million for information leading to the capture of … for his alleged involvement with Gameover ZeuS

Evgeniy Bogachev

Roger B. Taney

Sung-Mo Kang

Kim Seung Eock

Xem đáp án
14. Trắc nghiệm
1 điểm

Doing password cracking is easiest when one can actually … to a machine.

get physical access

install virus

set up policies

Xem đáp án
15. Trắc nghiệm
1 điểm

What kind of cable has speed up to 16MHz or 100Mbps (megabits per second) and uses for voice transmissions?

Category 7

Category 5

Category 3

Category 6

Xem đáp án
16. Trắc nghiệm
1 điểm

What kind of cable has 1000Mbps (some get 10Gbps) speed and is a most common type of network cable?

Category 3

Category 6

Category 1

Category 6a

Xem đáp án
17. Trắc nghiệm
1 điểm

What other way can a virus scanner work?

By blocking files that copy themselves.

By blocking all unknown files.

By looking at files for virus-like behavior.

Xem đáp án
18. Trắc nghiệm
1 điểm

Before you can build a defense for a network you need what?

Appropriate security clearance

A clear picture of the dangers that are protected against

To complete this textbook

The help of an external consultant

Xem đáp án
19. Trắc nghiệm
1 điểm

… simply monitors traffic, looking for suspicious activity that might indicate an attempted intrusion

An IPS

A firewall

An IDS

A proxy

Xem đáp án
20. Trắc nghiệm
1 điểm

If you wish to view items that have been removed from a website, what is the best way to do that?

Use Nessus

Use Nmap

Use www.archive.org

Xem đáp án
21. Trắc nghiệm
1 điểm

What is happening at this point is that this single machine is ..........pinging away at the target machine.

continual

continually

continuous

Xem đáp án
22. Trắc nghiệm
1 điểm

What common tools used for Dos mentioned in “Computer Security Fundamentals”?

TNF and Stacheldrahts

TFN and Stacheldraht

FTN and Stacheldrahd

NTF and Stacheldragh

Xem đáp án
23. Trắc nghiệm
1 điểm

Vince Cerf invented what?

The World Wide Web

Email

TCP

The first computer virus

Xem đáp án
24. Trắc nghiệm
1 điểm

Internet addresses of the form www.chuckeasttom.com are called what?

User-friendly web addresses

Uniform resource locators

User-accessible web addresses

Uniform address identifiers

Xem đáp án
25. Trắc nghiệm
1 điểm

A very popular tool for cracking Windows passwords is .... It is based on an understanding of how Windows passwords work.

OphCrack

Nessusn 2

MBSA

Xem đáp án
26. Trắc nghiệm
1 điểm

............. from Chapter 2 that typing in ping /? will show you all the options for the ping command.

Remember

Recall

~ Mention

Xem đáp án
27. Trắc nghiệm
1 điểm

By now you are aware, in a .......... way, of the dangers of the Internet, and you have explored a few basic rules for protection on the Internet.

generally

general

generalize

generalization

Xem đáp án
28. Trắc nghiệm
1 điểm

What kind of connection type has 64 Kbps speed?

DS0

T1

T3

ISDN

Xem đáp án
29. Trắc nghiệm
1 điểm

Every technology has limits; if you can exceed those limits, then you can take........

the system

the system offline

the system online

the offical system

Xem đáp án
30. Trắc nghiệm
1 điểm

What kind of cable has speed up to 20MHz/100Mbps and uses for Data lines, Ethernet networks?

Category 3

Category 4

Category 1

Category 6a

Xem đáp án
© All rights reserved VietJack