30 câu hỏi
What is a NIC?
Network interface card
Network interaction card
Network interface connector
Network interaction connector
What OphCrack does is boot to Linux and then get the SAM file and look up the … in a large table of hashed values it has, searching for a match. If it finds one, then the matching text in that table of hashed values is the password.
marked passwords
hashed passwords
Information
The old adage that “knowledge is power” is not only good advice, but also an axiom upon which to build your entire security outlook. Có nghĩa đúng nhất là
Có câu nói rằng “kiến thức là sức mạnh” không chỉ là lời khuyên tốt, mà còn là điều giúp bạn xây dựng nền tảng bảo mật.
Câu ngạn ngữ cũ rằng "kiến thức là sức mạnh" không chỉ là lời khuyên tốt, mà còn là một tiên đề để xây dựng toàn bộ triển vọng bảo mật của bạn.
Câu ngạn ngữ cũ rằng "kiến thức là sức mạnh" không chỉ là lời khuyên tốt, mà còn là điều kiện để xây dựng kỹ năng bảo mật của bạn.
Câu ngạn ngữ cũ rằng "kiến thức là sức mạnh" không chỉ là lời khuyên tốt, mà còn là vấn đề trước nhất để làm nền tảng cho kỹ năng bảo mật của bạn
The most common use of a key logger is to ...
save all information
capture usernames and passwords
open all passwords
replace old password
What was most interesting to security experts about the Mimail virus?
It spread in multiple ways.
It deleted critical system files.
It grabbed email addresses from documents on the hard drive.
What does POP3 mean?
Post Office Protocol version 3
Post Office Protection version 3
Protect Office Protocol version 3
Prevent Office Protocol version 3
Using Outlook, it takes less than … lines of code to reference Outlook and send out an email.
five
four
six
These are breaches based on someone who has access to your network misusing his access to steal data or compromise security
Insider threats
Web attacks
DNS poisoning
Malware
After a certain ........(certain number of machines pinging the server), it will stop responding to requests, and you will no longer be able to see the web page.
beginning
threshold
initiation
inception
If the recipient does open the attachment with Troj/Invo-Zip, then he will have installed spyware on his machine that would first disable the … and then start attempting to capture information including financial data. It even takes screenshots of the user’s desktop.
internet connection
antivirus program
console table
firewall
… general, virus scanners work in two ways.
In
Although
On
analyze… is written such that if the virus is disassembled, the code won’t be easily followed.
Compressed code
Notepad virus
Code lyoko
Code confusion
The … are simply files that list known viruses, their file size, properties, and behavior.
virus definitions
virus links
malwares
There are some perfectly … uses for spyware. Some employers have embraced such spyware as a means of monitoring employee use of company technology.
elegal
legal
illegal
legacy
CryptoWall is … of CryptoLocker first found in August 2014.
a variant
a copy
imitated
modeled
A … attempts to elude detection by performing its malicious activities only sporadically. With a …, the user will see symptoms for a short period, then no symptoms for a time.
sparse infector virus
trojan
polymorphic
macro
CryptoLocker utilized … to lock the user’s files.
asymmetric encryption
tool
symmetric encryption
hashing
A DoS that is launched from several different machines is called a ............... denial of service (DDoS) .
divided
distributed
dispensed
digested
Cisco Systems is one company that is … for high-quality routers and firewalls.
popular
selling
well known
Social engineering is …
a technique for breaching a system’s security by exploiting human nature rather than technology
a technique for breaching a system’s security by exploiting technology rather than human nature
a technique for breaching a system’s security by stealing access to the device
a technique for breaching a system’s security by installing malicious code into the system
This virus was particularly interesting for several reasons. To begin with, it spread both through email and copying itself to shared folders. Second, it could scan files on your PC looking for email addresses. Finally, it would disable processes used by antivirus scanners. In biological terms, this virus took out your computer’s “immune system”. What is this?
The Bagle virus
Flame
The Mimail virus
A Nonvirus virus
Which of the following is a major resource for detailed information on a computer virus?
The MIT Virus Library
The Microsoft Virus Library
The F-Secure Virus Library
The National Virus Repository
The second way a virus scanner can work is to look for virus-like ...
behavior
action
form
What protocol is used to send email, and on what port does it work?
SMTP, port 110
POP3, port 25
SMTP, port 25
POP3, port 110
How does a DoS attack work?
will attempt to make an online service or website unavailable by flooding it with unwanted traffic from multiple computers.
overload the system with requests, and it will no longer be able to respond to legitimate users attempting to access the web server.
an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments.
occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
What kind of connection type has 128 Kbps speed?
ISDN
T1
T3
OC3
What port does HTTP use?
80
24
22
23
Simply flood the target machine with so many packets that it can no longer respond to legitimate requests. It is important to be aware that this is just an ...........
illustrate
illustration
illustrative
What is HTML?
Hypertext Markup Language
High Text Markup Language
High-speed Transfer Markup Language
Hyper Transfer Markup Language
What year is the birth of the TCP/IP protocol?
1973
1983
1993
1995
