vietjack.com

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 2
Quiz

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 2

V
VietJack
Đại họcTrắc nghiệm tổng hợp5 lượt thi
30 câu hỏi
1. Trắc nghiệm
1 điểmKhông giới hạn

By attempting some of these techniques used by hackers on your network, you can assess your ...

vulture

vulnerability

vulgar

Xem đáp án
2. Trắc nghiệm
1 điểmKhông giới hạn

This attack is based on passing structured query language commands to a web application and getting the website to execute them. What is this?

Cross-Site Scripting

SQL Script Injection

Hashing

Xem đáp án
3. Trắc nghiệm
1 điểmKhông giới hạn

If such a … is attached to an email and the recipient is using Outlook, then the … can execute. That execution can do any number of things, including scanning the address book, looking for addresses, sending out email, deleting email, and more.

file

application

script

virus

Xem đáp án
4. Trắc nghiệm
1 điểmKhông giới hạn

Once a virus is on your system, it can do anything that any … program can do. That means it could potentially delete files, change system settings, or cause other harm

legitimate

illegal

unlawful

Xem đáp án
5. Trắc nghiệm
1 điểmKhông giới hạn

With …, an attacker injects client-side script into web pages viewed by other users.

Cross-Site Scripting

SQL Script Injection

Hashing

Xem đáp án
6. Trắc nghiệm
1 điểmKhông giới hạn

What is not node of ARPANET?

Soviet Union

UCLA

Stanford

UC Berkley

Xem đáp án
7. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following is a step that all computer users should take to protect against virus attacks?

Shut down all incoming ports.

Use nonstandard email clients.

Install and use antivirus software.

Xem đáp án
8. Trắc nghiệm
1 điểmKhông giới hạn

OphCrack depends on the attacker doing what?

Getting domain admin privileges.

Using social engineering.

Getting physical access to the machine.

Xem đáp án
9. Trắc nghiệm
1 điểmKhông giới hạn

For many years, one needed significant programming skills in order to create a virus. However, in recent years there have been a number of tools developed that create viruses. These tools allow …. This is one reason viruses are becoming so prevalent.

the admin to clear the virus

the end user to click a few buttons and create a virus

the customer to identify security vulnerabilities

Xem đáp án
10. Trắc nghiệm
1 điểmKhông giới hạn

Keep in mind that the scanner only works if you keep it updated. What does “keep in mind that” mean?

hãy nhớ rằng

cứ cho là

giả sử là

Xem đáp án
11. Trắc nghiệm
1 điểmKhông giới hạn

....... , you are going to set these packets to be almost as large as you can send.

However

Though

Thus

Xem đáp án
12. Trắc nghiệm
1 điểmKhông giới hạn

The Trojan horse gets its name from an ancient tale “…”

War horse

The city of Troy

Legend of the horse

Fairy tale

Xem đáp án
13. Trắc nghiệm
1 điểmKhông giới hạn

An armored virus uses techniques that make it hard to ...

scan

clean

Find

Xem đáp án
14. Trắc nghiệm
1 điểmKhông giới hạn

In some cases the sparse infector targets a specific program but the virus only executes every 10th time or 20th time that target program executes. Or a sparse infector may have a burst of activity and then lie dormant for a period of time. There are a number of variations on the theme, but the basic principle is the same: to … the frequency of attack and thus reduce the chances for detection.

reduce

increase

interference

block

Xem đáp án
15. Trắc nghiệm
1 điểmKhông giới hạn

It is a fairly typical virus in that it spreads primarily through email, but it also uses file sharing utilities to copy itself. It copies itself to various directories and shared folders. In one interesting twist, it attempts to copy itself to C:\WINDOWS\FVProtect.exe. The name would make many people (including otherwise technically savvy people) think this program was actually part of some antivirus utility. It also copies itself to C:\WINDOWS\userconfig9x.dll. Again, it would appear to be a system file, thus making people less likely to delete it. What is it?

CryptoLocker

MacDefender

W32/Netsky-P

Troj/Invo-Zip

Xem đáp án
16. Trắc nghiệm
1 điểmKhông giới hạn

The Malwarebytes firewall will examine each packet, denying or permitting access based … on the examination of the current packet, but also on data derived from previous packets in the conversation.

completely

heavily

not only

Xem đáp án
17. Trắc nghiệm
1 điểmKhông giới hạn

What kind of cable has 100MHz/100Mbps speed, most common a few years ago and still widely used?

Category 7

Category 1

Category 5

Category 6

Xem đáp án
18. Trắc nghiệm
1 điểmKhông giới hạn

The basic concept requires a .........of technical skill.

minimum

normal

perfect

Xem đáp án
19. Trắc nghiệm
1 điểmKhông giới hạn

In order to see this denial happen with as few machines involved as possible, you ....... use a very low-capacity PC as your web server.

can

could

May

Might

Xem đáp án
20. Trắc nghiệm
1 điểmKhông giới hạn

A … IDS just monitors suspicious activity and then logs it.

quick

smart

passive

Xem đáp án
21. Trắc nghiệm
1 điểmKhông giới hạn

It is merely the process of determining if the credentials given by a user or another system (such as a username and password) are authorized to access the network resource in question. What is it?

Authentication

Auditing

Transmission

Block

Xem đáp án
22. Trắc nghiệm
1 điểmKhông giới hạn

The TCP protocol operates at what layer of the OSI model?

Transport layer

Data Link Layer

Application Layer

Physical Layer

Xem đáp án
23. Trắc nghiệm
1 điểmKhông giới hạn

DoS attack does not even attempt to intrude on your system or to ........ sensitive information;

obtaining

obtained

obtain

Xem đáp án
24. Trắc nghiệm
1 điểmKhông giới hạn

Whatever the behavior, antivirus software uses specific algorithms to … the likelihood that a given file is actually a virus.

evaluate

evaluation

evaluating

Xem đáp án
25. Trắc nghiệm
1 điểmKhông giới hạn

What is SQL?

Struggle Query Language

Structured Query Language

Structural Query Language

Xem đáp án
26. Trắc nghiệm
1 điểmKhông giới hạn

What is the first step in understanding computer and network security?

Formulate a realistic assessment of the threats

Building network security system

Set the security mode

Evaluate network performance

Xem đáp án
27. Trắc nghiệm
1 điểmKhông giới hạn

This chapter will describe for you, in depth, the workings of the denial of service (DoS) attack. This threat is one of the most common attacks on the Internet, so it is ........... for you to understand how it works and how to defend yourself against it

intelligent

prudent

diplomatic

judicious

Xem đáp án
28. Trắc nghiệm
1 điểmKhông giới hạn

If you enter username 'jdoe' and the password 'password', this code produces this SQL command:

SELECT FROM tblUsers WHERE USERNAME = 'jdoe' AND PASSWORD = 'password'

SELECT FROM tblUsers WHEN USERNAME = 'jdoe' AND PASSWORD = 'password'

SELECT FROM tblUsers WHICH USERNAME = 'jdoe' AND PASSWORD = 'password'

SELECT FROM tblUsers WHEN USERNAME = 'jdoe' OR PASSWORD = 'password'

Xem đáp án
29. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following was one of the three universities involved in the original distributed network setup by a government agency?

Berkeley

Harvard

MIT

Princeton

Xem đáp án
30. Trắc nghiệm
1 điểmKhông giới hạn

What is an advantage of using Nessus? Use your favorite search engine to research Nessus to answer this question.

It is free for businesses.

It is designed for Windows systems.

It has a wide range of vulnerabilities it can check for.

Xem đáp án
© All rights reserved VietJack