30 câu hỏi
The ... attack essentially realizes that the hash cannot be reversed; rather than trying to find out what the password is, the attacker just sends over the hash. If the attacker can obtain a valid username and user password hashes values (just the hash—the attacker does not know the actual password), then the hacker can use that hash, without ever knowing the actual password.
login as system
pass the hash
net user scripts
One of the most widely known examples of ransomeware is the infamous …, first discovered in 2013.
CryptoLocker
FakeAV
Rombertik
CryptoWall
SQL injection is based on what?
Having database admin privileges.
Creating an SQL statement that will force access.
Creating an SQL statement that is always true.
What class would the IP address of 193.44.34.12 be?
A
B
C
D
What kind of connection type has 155 Mbps speed?
ISDN
T1
T3
OC3
What kind of connection type has 1.54 Mbps speed?
ISDN
T1
T3
OC3
What is SAM?
Security Accounts Manager
Service Access Manager
Service Accounts Media
Which layer of the OSI model is divided into two sublayers?
Data link
Network
Presentation
Session
What does HTTP mean?
Hypertext Transmission Protocol
Hypertext Transfer Protocol
High Text Transfer Protocol
High Text Transmission Protocol
What kind of cable has 40Gbps speed?
Category 5
Category 8
Category 6
Category 7
Recall that the second way a virus scanner works is to watch for certain types of behaviors that are … of a virus. This might include any program that attempts to write to your hard drive’s boot sector, change system files, automate your email software, or self-multiply. Programs that attempt to modify the system Registry (for Windows systems) or alter any system settings may also be indicative of a virus.
typical
type
typically
What is the malware?
a generic term for software that has a malicious purpose
an antivirus security software for computer
unknown software which steal user information
software which protect computer system
Rombertik uses the … to read user credentials to websites. It is most often sent as an attachment to an email. Perhaps even worse, in some situations it will either … the master boot record on the hard drive, making the machine unbootable, or begin encrypting files in the user’s home directory.
application / clear
tool / clean
browser / overwrite
mail reader / block
What is spyware?
Any software that monitors your system
Only software that logs keystrokes
Any software used to gather intelligence
Only software that monitors what websites you visit
Which of the following is a vulnerability scanner specifically for Windows systems?
Nmap.
OphCrack.
Nessus.
A …, no matter what type you get, is basically a tool to block certain traffic.
hub
router
firewall
A … hacker is normally a law-abiding citizen, but in some cases will venture into illegal activities
white hat
blue hat
black hat
gray hat
IDS is
Intrusion Detection System
Internet Data Storage
Information Defense System
Integrated Database Software
A person who uses hacking techniques for illegal activities is referred to as what?
A cracker
A hacker
A gray hat hacker
Of course, just one machine in your classroom or lab that is simply pinging on your web server is not going to ......... affect the web server
adversity
adversely
adversing
adversed
What factor about the Sobig virus made it most intriguing to security experts?
It was difficult to protect against.
It was very sophisticated.
It spread in multiple ways.
Choose the wrong feature of computer virus.
Some viruses can hide the changes they make, making it much more difficult for the virus is detected.
The virus can bring other viruses: A virus can lead to another virus making it much more lethal and help each other to hide or even assist you to infect a particular section of the computer.
Mutations in the genetic code cause new virus strains to appear, and the pressures of natural selection allow some of these strains to evolve into entirely new species of viruses.
A virus is capable of being a resident, that is first loaded into memory and then infects the computer. It can also be non-resident when the virus code is executed only every time a file is opened.
What protocol is used for remotely logging on to a computer?
Telnet
HTTP
DNS
SMTP
A key logger is what type of malware?
Buffer overflow.
Trojan horse.
Spyware.
If you send a packet (a unit of data transmission) from one computer to another, a copy of that packet is actually sent out from every port on the …
hub
proxy
router
converter
Likewise, ......DoS attacks use much more sophisticated methods.
actualy
actual
factual
nowadays
Which of the following is the safest way to send and receive attachments?
Use encryption.
Use virus scanners before opening attachments.
Use a code word indicating the attachment is legitimate.
Firewalls and proxy servers guard the perimeter by … and …
analyzing traffic / redirecting data to another place
redirecting data to another place / blocking all traffic
analyzing traffic / blocking traffic that has been disallowed by the administrator
faking IP / removing all of the operand
What kind of cable has low-speed analog and uses for telephone,doorbell?
Category 5
Category 7
Category 1
Category 4
Which of the following is a popular port scanner?
Nmap
OphCrack.
Nessus.
