21 câu hỏi
These are designed to prevent legitimate access to your system
Malware
DoS attacks
Session hijacking
Insider threats
The SPI firewall can also look at the actual contents of the packet, which allows for some very advanced filtering capabilities. What is SPI?
Sharing Power Internet
Stateful Packet Inspection
Spyware Protect International
what do DoS attack aim?
to intrude on your system.
to prevent legitimate users from accessing the system
to obtain sensitive information.
to destroy your system.
Signal repeaters …
boost the entire signal they receive, including any noise
boost the wifi signal
regenerate the signal, and thus don’t rebroadcast noise
boost the entire signal they receive, except any noise
What protocol is used for web pages, and what port does it work on?
HTTP, port 21
HTTP, port 80
DHCP, port 80
DHCP, port 21
What is ARPA?
Advanced Research Projects Agency
Advanced Research Profiles Agency
Advanced Resource Projects Agency
Advanced Resource Profiles Agency
This type of attack used to locating vulnerable wireless networks. What is this?
war-driving
war-dialing
war-dying
war-flying
How big is a TCP packet header?
The size is dependent on the data being sent.
The size is always 20 bytes.
The size is dependent on the protocol being used.
The size is always 40 bytes.
Which U.S. government agency created the distributed network that formed the basis for the Internet?
Advanced Research Projects Agency
Central Intelligence Agency
NASA
Department of Energy
… is a virus that creates a peer-to-peer botnet .
Rombertik
FakeAV
The Sobig Virus
Gameover ZeuS
Which of the following is the best definition of virus?
Program used in a DoS attack.
Program that slows down networks.
Program that self-replicates.
What are four brands of antivirus software that virtually dominate the antivirus market today?
McAfee, Malwarebytes, AVG, Kapersky
McAfee, Norton, AVG, Malwarebytes
McAfee, Norton, AVG, Kapersky
… is the combination of your computer's IP address and port number
Packet
Socket
Port
Bandwidth
What are three pillars of security in the CIA triangle
confidentiality, integrity, and availability
confidentiality, integrity, and abaci
cabbala, integrity, and availability
cabbala, identity, and abaci
If you exceed any of computer limits, the ........load will stop the system from responding
excessive
excess
excessiveness
excessively
IPS is …
Intrusion Prevention System
Internet Protocol Security
Information Processing Server
Intelligent Power Supply
A workload for a computer system may be defined by the number of simultaneous users, the size of files, the speed of data..........., or the amount of data stored.
transmission
transmited
transmiting
DoS attack does not even attempt to intrude on your system or to obtain ...........information;
sensitive
user
important
What year did the e-commerce via websites appear?
2003
2004
2005
2006
What is the most common way for a virus to spread?
By FTP.
By downloading from a website.
By email attachment.
The –t ........the ping utility to keep sending packets until explicitly told to stop.
indicates
instructs
inducts
