30 câu hỏi
The point where the backbones of the Internet connect is called what?
Connectors
Routers
Network access points
Switches
It utilized a multimodal approach to spreading. This means that it used more than one mechanism to spread and infect new machines. It would copy itself to any shared drives on your network and would email itself out to everyone in your address book. What is it?
The Sobig virus
MacDefender
W32/Netsky-P
Troj/Invo-Zip
Ask several people to open their browsers and key the IP address of that machine in the address........... They should then be viewing the default website for that web server.
tab
bar
server
key
A virus will usually spread primarily in one of two ways. The first is to simply … your computer for connections to a network and then … itself to other machines on the network to which your computer has access. This is actually the most efficient way for a virus to spread.
scan / copy
find / replicate
attack / harm
In net user script, the attacker writes the following two-line script (obviously the word localaccountname is replaced with an actual local account name.):
net user /domain /block localaccountname password / net group /domain "Domain Admins" /add Domain
net user /domain /add localaccountname password/ net group /domain "Domain Admins" /add Domain
net admin /domain /add localaccountname password/ net group /domain "Domain Admins" /add Domain
The email it sent claimed to be from your system administrator. It would tell you that your email account had been infected by a virus and that you should open the attached file to get instructions. Once you opened the attached file, your system was infected. What is this?
The Bagle virus
Flame
The Mimail virus
A Nonvirus virus
What does DNS mean?
Domain Name Service
Domain Name System
Domain Number Service
Domain Number System
What does SMTP mean?
Simple Mail Transfer Protocol
Simple Mail Transmission Protocol
Simple Monitor Transfer Protocol
Simple Monitor Transmission Protocol
What is IPv4 length?
32 bits
16 bits
8 bits
64 bits
A … is basically an intelligent hub; it works and looks exactly like a hub, with one significant difference. When a … receives a packet, it will send that packet only out the port for the computer to which it needs to go. A … essentially a hub that is able to determine where a packet is being sent.
router
firewall
switch
Proxy
… is a unit of data transmission. Has a header (shows origin, destination, packet type), body (data) and a footer (indicates when the message is over)
Packet
Port
Socket
Bandwidth
Which of the following reasons most likely made the Bagle virus spread so rapidly?
It was a sophisticated virus.
It was particularly virulent.
The email containing it claimed to be from the system administrator.
Multi-partite viruses attack the computer in multiple ways for example, infecting the boot sector of the … and one or more files.
hard disk
network card
ram
server
When was Ethernet cable developed?
1976
1974
1975
1977
There is a third method, called … scanning.
heuristic
horistic
heuristic
It is based .........the fact that any device has operational limits.
on
at
above
By now you are aware, in a general way, of the dangers of the Internet, and you have ........a few basic rules for protection on the Internet.
explored
found
searched
… is fast becoming as big a problem, even bigger than viruses.
Malware
Trojan
Ransomware
Spyware
Another new type of virus has been gaining popularity in the past few years, and that is the “… virus” or, put simply, a hoax. Rather than actually writing a virus, a hacker sends an email to every address he has. The email claims to be from some well-known antivirus center and warns of a new virus that is circulating. The email instructs people to delete some file from their computer to get rid of the virus. The file, however, is not really a virus but part of a computer’s system.
Nonvirus
Bagle
Gameover ZeuS
Sobig
What port does POP3 use?
110
24
22
23
Some well-known Trojan horses such as the 2nd Thought application that downloads to a person’s PC and then blasts it with ...
advertising
advertisements
dverse
The –w option ..........how many milliseconds the ping utility will wait for a response from the target.
decides
determines
settles
What is the most stealthy way to find out what type of server a website is running?
Use Cain and Abel
Use Nmap
Use www.archive.org
This virus is very interesting for multiple reasons. First, it specifically targets Macintosh computers.. What is this?
CryptoLocker
MacDefender
Rombertik
CryptoWall
… is main transmission lines for internet connections
ADSL
Lease line
Backbone
Core
What kind of cable has 10Gbps speed and uses for very high-speed network?
Category 5
Category 7
Category 6
Category 8
A … hacker is the person normally depicted in the media. Once she gains access to a system, her goal is to cause some type of harm.
white hat
blue hat
black hat
gray hat
When was the birth of Usenet newsgroups?
1979
1978
1980
1982
Amplifier repeaters simply boost …
the entire signal they receive, including any noise
the wifi signal
the cell phone signal
the entire signal they receive, except any noise
What can you do with a firewall to help protect against virus attacks?
Close all incoming ports.
None of the above.
Shut down all unneeded ports.
