30 câu hỏi
By attempting some of these techniques used by hackers on your network, you can assess your ...
vulture
vulnerability
vulgar
This attack is based on passing structured query language commands to a web application and getting the website to execute them. What is this?
Cross-Site Scripting
SQL Script Injection
Hashing
If such a … is attached to an email and the recipient is using Outlook, then the … can execute. That execution can do any number of things, including scanning the address book, looking for addresses, sending out email, deleting email, and more.
file
application
script
virus
Once a virus is on your system, it can do anything that any … program can do. That means it could potentially delete files, change system settings, or cause other harm
legitimate
illegal
unlawful
With …, an attacker injects client-side script into web pages viewed by other users.
Cross-Site Scripting
SQL Script Injection
Hashing
What is not node of ARPANET?
Soviet Union
UCLA
Stanford
UC Berkley
Which of the following is a step that all computer users should take to protect against virus attacks?
Shut down all incoming ports.
Use nonstandard email clients.
Install and use antivirus software.
OphCrack depends on the attacker doing what?
Getting domain admin privileges.
Using social engineering.
Getting physical access to the machine.
For many years, one needed significant programming skills in order to create a virus. However, in recent years there have been a number of tools developed that create viruses. These tools allow …. This is one reason viruses are becoming so prevalent.
the admin to clear the virus
the end user to click a few buttons and create a virus
the customer to identify security vulnerabilities
Keep in mind that the scanner only works if you keep it updated. What does “keep in mind that” mean?
hãy nhớ rằng
cứ cho là
giả sử là
....... , you are going to set these packets to be almost as large as you can send.
However
Though
Thus
The Trojan horse gets its name from an ancient tale “…”
War horse
The city of Troy
Legend of the horse
Fairy tale
An armored virus uses techniques that make it hard to ...
scan
clean
Find
In some cases the sparse infector targets a specific program but the virus only executes every 10th time or 20th time that target program executes. Or a sparse infector may have a burst of activity and then lie dormant for a period of time. There are a number of variations on the theme, but the basic principle is the same: to … the frequency of attack and thus reduce the chances for detection.
reduce
increase
interference
block
It is a fairly typical virus in that it spreads primarily through email, but it also uses file sharing utilities to copy itself. It copies itself to various directories and shared folders. In one interesting twist, it attempts to copy itself to C:\WINDOWS\FVProtect.exe. The name would make many people (including otherwise technically savvy people) think this program was actually part of some antivirus utility. It also copies itself to C:\WINDOWS\userconfig9x.dll. Again, it would appear to be a system file, thus making people less likely to delete it. What is it?
CryptoLocker
MacDefender
W32/Netsky-P
Troj/Invo-Zip
The Malwarebytes firewall will examine each packet, denying or permitting access based … on the examination of the current packet, but also on data derived from previous packets in the conversation.
completely
heavily
not only
What kind of cable has 100MHz/100Mbps speed, most common a few years ago and still widely used?
Category 7
Category 1
Category 5
Category 6
The basic concept requires a .........of technical skill.
minimum
normal
perfect
In order to see this denial happen with as few machines involved as possible, you ....... use a very low-capacity PC as your web server.
can
could
May
Might
A … IDS just monitors suspicious activity and then logs it.
quick
smart
passive
It is merely the process of determining if the credentials given by a user or another system (such as a username and password) are authorized to access the network resource in question. What is it?
Authentication
Auditing
Transmission
Block
The TCP protocol operates at what layer of the OSI model?
Transport layer
Data Link Layer
Application Layer
Physical Layer
DoS attack does not even attempt to intrude on your system or to ........ sensitive information;
obtaining
obtained
obtain
Whatever the behavior, antivirus software uses specific algorithms to … the likelihood that a given file is actually a virus.
evaluate
evaluation
evaluating
What is SQL?
Struggle Query Language
Structured Query Language
Structural Query Language
What is the first step in understanding computer and network security?
Formulate a realistic assessment of the threats
Building network security system
Set the security mode
Evaluate network performance
This chapter will describe for you, in depth, the workings of the denial of service (DoS) attack. This threat is one of the most common attacks on the Internet, so it is ........... for you to understand how it works and how to defend yourself against it
intelligent
prudent
diplomatic
judicious
If you enter username 'jdoe' and the password 'password', this code produces this SQL command:
SELECT FROM tblUsers WHERE USERNAME = 'jdoe' AND PASSWORD = 'password'
SELECT FROM tblUsers WHEN USERNAME = 'jdoe' AND PASSWORD = 'password'
SELECT FROM tblUsers WHICH USERNAME = 'jdoe' AND PASSWORD = 'password'
SELECT FROM tblUsers WHEN USERNAME = 'jdoe' OR PASSWORD = 'password'
Which of the following was one of the three universities involved in the original distributed network setup by a government agency?
Berkeley
Harvard
MIT
Princeton
What is an advantage of using Nessus? Use your favorite search engine to research Nessus to answer this question.
It is free for businesses.
It is designed for Windows systems.
It has a wide range of vulnerabilities it can check for.
