30 câu hỏi
When a hacking technique uses persuasion and deception to get a person to provide information to help compromise security, this is referred to as what?
Social engineering
Conning
Human intel
Soft hacking
Every technology has limits; if you can exceed those limits, then you can take........
the system
the system offline
the system online
the offical system
You are going to use –0 so that the ping ...........does not wait at all.
benefit
useful
utility
Simply overload the system with requests, and it will no longer be able to respond to legitimate users attempting to access the web server.
legitimate
legitimately
egitimac
One type of cable is STP. It is …
shielded twisted-pair
shell twisted-pair
shielded twice-pair
shell twice-pair
The simplest device for connecting computers is called what?
NIC
Interface
Hub
Router
… is a handle, or a connection point. It is a numeric designation for a particular pathway of communications.
Packet
Port
Socket
Bandwidth
A memory-resident virus … itself and then remains in RAM from the time the computer is booted up to when it is shut down.
copies
installs
deletes
replicates
What is a virus scanner?
It is essentially software that tries to prevent a virus from infecting your system.
It is essentially software that blocks all risk factors for your system.
It is essentially software that finds a virus which harm your computer.
It is important to … between on-demand virus scanning and ongoing scanners.
differentiate
different
difference
What type of cable do most networks use?
Net cable
Category 3 cable
Phone cable
Category 5 cable
This “mail reader” program is made by Microsoft. What is it?
Outlook
Postbox
Thunderbird
Mailspring
Mimail had its own built-in …, so it did not have to “piggy back” off your email client
inbox
drafts
email engine
snoozed
When you update your virus definitions, … actually occurs is that your current file is replaced by the more recent one on the vendor’s website.
what
why
when
Computers are no different than any other machine; they, ........, have limits
still
too
So
The connector used with network cables is called what?
RJ-11
RJ-85
RJ-12
RJ-45
A person who uses tools to hack without understanding the underlying technology is called what?
A novice
A gray hat hacker
A script kiddy
The data specification for each cable is the maximum that the cable can handle. The maximum speed.
Bandwidth
Latency
Speed
Ping
What is the most common damage caused by virus attacks?
Changing the Windows Registry.
Corrupting the operating system.
Slowing down networks by the virus traffic.
A … is often used with a firewall to hide the internal network’s IP address and present a single IP address (its own) to the outside world.
switch
proxy
router
hub
Trying to list all the servers on a network is referred to as what?
Vulnerability scanning
Scouting
Enumeration
Which of the following is not one of the three major classes of threats?
Attempts to intrude on the system
Online auction fraud
Denial of service attacks
A computer virus
These attacks are rather advanced and involve an attacker attempting to take over a session
Session hijacking
Insider threats
Web attacks
DNS poisoning
Amplifier repeaters simply boost …
the entire signal they receive, including any noise
the wifi signal
the cell phone signal
the entire signal they receive, except any noise
DoS có nghĩa là............
tấn công từ chối dịch vụ
từ chối dịch vụ
tấn công dịch vụ từ chối phân tán
hệ điều hành đĩa
… one uses an IDS or IPS is a decision that must be made after a thorough risk analysis.
Whether
Whatever
Whenever
How can you prevent cross-site scripting?
Use an IDS.
Use a firewall.
Filter user input.
Hacking is not the ... you see in movies
dramatic process
interesting process
mysterious situation
enigmatical situation
Tim Berners-Lee invented what?
The World Wide Web
TCP
The first computer virus
Which of the following virus attacks used a multimodal approach?
Sobig virus.
Bagle virus.
Slammer virus
