30 câu hỏi
What made the Bagle virus so dangerous?
It deleted key system files.
It corrupted the operating system.
It disabled antivirus software.
Parents can also … to use spyware on their home computer to monitor the activities of their children on the Internet.
lock
block
elect
election
MacDefender was first seen in the early months of 2011.
2010
2011
2012
2013
A Vietnamese name of a repeater is…
Bộ khuếch đại
Bộ lặp
Bộ chuyển mạch
Bộ phát song
What is a buffer-overflow attack?
Putting more email in an email system than it can hold.
Overflowing the system.
Putting more data in a buffer than it can hold.
What is IPv6 length?
128 bits
64 bits
256 bits
32 bits
According to a recent survey of 223 computer professionals prepared by the Computer Security Institute, which of the following was cited as an issue by more of the respondents?
Internal systems
Employee abuse
Routers
Internet connection
What is war-driving?
Driving and seeking a computer job
Driving while using a wireless connection to hack
Driving looking for wireless networks to hack
Driving and seeking rival hackers
The infamous I Love You virus actually had no … payload, but the sheer volume of emails it generated bogged … many networks.
negative / down
positive / down
negative / up
positive / up
What kind of connection type has 43.2 Mbps speed?
ISDN
T1
T3
OC3
Which of the following is a popular enumeration tool?
Nmap
MBSA
Cheops
..... the target machine with so many packets that it can no longer respond to legitimate requests. It is important to be aware that this is just an illustration.
In order to make
Simply flood
When
Easy to make
A device used to connect two or more networks is a what?
Switch
Router
Hub
NIC
Blocking incoming ICMP packets will prevent what type of scan?
Ping
SYN
FIN
A rather astonishing … of those surveyed detected employee abuse of systems/Internet (Computer Security Institute, 2002)
75%
76%
77%
78%
What kind of connection type has 622 Mbps speed?
ISDN
T1
T3
OC12
This particular piece of spyware (the 2nd Thought application) is one that downloads to your PC when you visit certain websites. It is benign in that it causes no direct harm to your system or files, nor does it gather sensitive information from your PC. However, it is incredibly annoying as it inundates your machine with unwanted ...
scripts
ads
files
DoS attack does not even ............to intrude on your system or to obtain sensitive information;
attempt
attemptly
attempted
What is a penetration tester?
A person who hacks a system without being caught
A person who hacks a system by faking a legitimate password
A person who hacks a system to test its vulnerabilities
A person who is an amateur hacker
Spyware can be as simple as a … used by a website to record a few brief facts about your visit to that website, or it could be of a more insidious type, such as a key logger.
url
cookie
password
address
The most common place to encounter a firewall is … your network and the outside world.
below
above
between
Which of the following is something a Trojan horse might do?
Change ports on your computer.
Alter your IP address.
Open a backdoor for malicious software.
. is a technique for breaching a system’s security by exploiting human nature rather than technology.
Antivirus software
International system
Social engineering
Security system
A more advanced form of a polymorphic virus is called the … virus; it can completely change itself.
file infector
boot sector
macro
metamorphic
The name comes from the fact that the Internet is full of utilities and scripts that one can download to perform some hacking tasks. Many of these tools have an easy-to use graphical user interface that allows someone with very little if any skill to operate the tool. A classic example is the Low Earth Orbit Ion Cannon tool for executing a DoS attack. Someone who downloads such a tool without really understanding the target system is considered a script kiddy. A significant number of the people you are likely to encounter who call themselves hackers are, in reality, mere ...
script kiddies
phreaking
ethical hacking
DoS attack
One extreme viewpoint about computer security is what?
The federal government will handle security
Microsoft will handle security.
There are no imminent dangers to your system.
There is no danger if you use Linux.
What is TTL?
Time To Live
Transmission Termination Link
Total Transfer Load
Terminal Transmission Line
In the quarter there were also 12 attacks that ..........as “mega attacks,” peaking at more than 1,000 gigabits per second (Gbps) and 50 million packets per second (Mpps).”
categorized
were categorized
were categorizing
One … to accomplish sandboxing is for the operating system to set aside a protected area of memory to open the suspected file and to monitor its behavior.
case
things
way
It includes virus attacks, worms, adware, Trojan horses, and spyware. What is it
DoS attacks
Symantec
DNS poisoning
Malware
