vietjack.com

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 5
Quiz

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 5

V
VietJack
Đại họcTrắc nghiệm tổng hợp4 lượt thi
30 câu hỏi
1. Trắc nghiệm
1 điểmKhông giới hạn

The point where the backbones of the Internet connect is called what?

Connectors

Routers

Network access points

Switches

Xem đáp án
2. Trắc nghiệm
1 điểmKhông giới hạn

It utilized a multimodal approach to spreading. This means that it used more than one mechanism to spread and infect new machines. It would copy itself to any shared drives on your network and would email itself out to everyone in your address book. What is it?

The Sobig virus

MacDefender

W32/Netsky-P

Troj/Invo-Zip

Xem đáp án
3. Trắc nghiệm
1 điểmKhông giới hạn

Ask several people to open their browsers and key the IP address of that machine in the address........... They should then be viewing the default website for that web server.

tab

bar

server

key

Xem đáp án
4. Trắc nghiệm
1 điểmKhông giới hạn

A virus will usually spread primarily in one of two ways. The first is to simply … your computer for connections to a network and then … itself to other machines on the network to which your computer has access. This is actually the most efficient way for a virus to spread.

scan / copy

find / replicate

attack / harm

Xem đáp án
5. Trắc nghiệm
1 điểmKhông giới hạn

In net user script, the attacker writes the following two-line script (obviously the word localaccountname is replaced with an actual local account name.):

net user /domain /block localaccountname password / net group /domain "Domain Admins" /add Domain

net user /domain /add localaccountname password/ net group /domain "Domain Admins" /add Domain

net admin /domain /add localaccountname password/ net group /domain "Domain Admins" /add Domain

Xem đáp án
6. Trắc nghiệm
1 điểmKhông giới hạn

The email it sent claimed to be from your system administrator. It would tell you that your email account had been infected by a virus and that you should open the attached file to get instructions. Once you opened the attached file, your system was infected. What is this?

The Bagle virus

Flame

The Mimail virus

A Nonvirus virus

Xem đáp án
7. Trắc nghiệm
1 điểmKhông giới hạn

What does DNS mean?

Domain Name Service

Domain Name System

Domain Number Service

Domain Number System

Xem đáp án
8. Trắc nghiệm
1 điểmKhông giới hạn

What does SMTP mean?

Simple Mail Transfer Protocol

Simple Mail Transmission Protocol

Simple Monitor Transfer Protocol

Simple Monitor Transmission Protocol

Xem đáp án
9. Trắc nghiệm
1 điểmKhông giới hạn

What is IPv4 length?

32 bits

16 bits

8 bits

64 bits

Xem đáp án
10. Trắc nghiệm
1 điểmKhông giới hạn

A … is basically an intelligent hub; it works and looks exactly like a hub, with one significant difference. When a … receives a packet, it will send that packet only out the port for the computer to which it needs to go. A … essentially a hub that is able to determine where a packet is being sent.

router

firewall

switch

Proxy

Xem đáp án
11. Trắc nghiệm
1 điểmKhông giới hạn

… is a unit of data transmission. Has a header (shows origin, destination, packet type), body (data) and a footer (indicates when the message is over)

Packet

Port

Socket

Bandwidth

Xem đáp án
12. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following reasons most likely made the Bagle virus spread so rapidly?

It was a sophisticated virus.

It was particularly virulent.

The email containing it claimed to be from the system administrator.

Xem đáp án
13. Trắc nghiệm
1 điểmKhông giới hạn

Multi-partite viruses attack the computer in multiple ways for example, infecting the boot sector of the … and one or more files.

hard disk

network card

ram

server

Xem đáp án
14. Trắc nghiệm
1 điểmKhông giới hạn

When was Ethernet cable developed?

1976

1974

1975

1977

Xem đáp án
15. Trắc nghiệm
1 điểmKhông giới hạn

There is a third method, called … scanning.

heuristic

horistic

heuristic

Xem đáp án
16. Trắc nghiệm
1 điểmKhông giới hạn

It is based .........the fact that any device has operational limits.

on

at

above

Xem đáp án
17. Trắc nghiệm
1 điểmKhông giới hạn

By now you are aware, in a general way, of the dangers of the Internet, and you have ........a few basic rules for protection on the Internet.

explored

found

searched

Xem đáp án
18. Trắc nghiệm
1 điểmKhông giới hạn

… is fast becoming as big a problem, even bigger than viruses.

Malware

Trojan

Ransomware

Spyware

Xem đáp án
19. Trắc nghiệm
1 điểmKhông giới hạn

Another new type of virus has been gaining popularity in the past few years, and that is the “… virus” or, put simply, a hoax. Rather than actually writing a virus, a hacker sends an email to every address he has. The email claims to be from some well-known antivirus center and warns of a new virus that is circulating. The email instructs people to delete some file from their computer to get rid of the virus. The file, however, is not really a virus but part of a computer’s system.

Nonvirus

Bagle

Gameover ZeuS

Sobig

Xem đáp án
20. Trắc nghiệm
1 điểmKhông giới hạn

What port does POP3 use?

110

24

22

23

Xem đáp án
21. Trắc nghiệm
1 điểmKhông giới hạn

Some well-known Trojan horses such as the 2nd Thought application that downloads to a person’s PC and then blasts it with ...

advertising

advertisements

dverse

Xem đáp án
22. Trắc nghiệm
1 điểmKhông giới hạn

The –w option ..........how many milliseconds the ping utility will wait for a response from the target.

decides

determines

settles

Xem đáp án
23. Trắc nghiệm
1 điểmKhông giới hạn

What is the most stealthy way to find out what type of server a website is running?

Use Cain and Abel

Use Nmap

Use www.archive.org

Xem đáp án
24. Trắc nghiệm
1 điểmKhông giới hạn

This virus is very interesting for multiple reasons. First, it specifically targets Macintosh computers.. What is this?

CryptoLocker

MacDefender

Rombertik

CryptoWall

Xem đáp án
25. Trắc nghiệm
1 điểmKhông giới hạn

… is main transmission lines for internet connections

ADSL

Lease line

Backbone

Core

Xem đáp án
26. Trắc nghiệm
1 điểmKhông giới hạn

What kind of cable has 10Gbps speed and uses for very high-speed network?

Category 5

Category 7

Category 6

Category 8

Xem đáp án
27. Trắc nghiệm
1 điểmKhông giới hạn

A … hacker is the person normally depicted in the media. Once she gains access to a system, her goal is to cause some type of harm.

white hat

blue hat

black hat

gray hat

Xem đáp án
28. Trắc nghiệm
1 điểmKhông giới hạn

When was the birth of Usenet newsgroups?

1979

1978

1980

1982

Xem đáp án
29. Trắc nghiệm
1 điểmKhông giới hạn

Amplifier repeaters simply boost …

the entire signal they receive, including any noise

the wifi signal

the cell phone signal

the entire signal they receive, except any noise

Xem đáp án
30. Trắc nghiệm
1 điểmKhông giới hạn

What can you do with a firewall to help protect against virus attacks?

Close all incoming ports.

None of the above.

Shut down all unneeded ports.

Xem đáp án
© All rights reserved VietJack