vietjack.com

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 6
Quiz

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 6

V
VietJack
Đại họcTrắc nghiệm tổng hợp8 lượt thi
30 câu hỏi
1. Trắc nghiệm
1 điểmKhông giới hạn

The ... attack essentially realizes that the hash cannot be reversed; rather than trying to find out what the password is, the attacker just sends over the hash. If the attacker can obtain a valid username and user password hashes values (just the hash—the attacker does not know the actual password), then the hacker can use that hash, without ever knowing the actual password.

login as system

pass the hash

net user scripts

Xem đáp án
2. Trắc nghiệm
1 điểmKhông giới hạn

One of the most widely known examples of ransomeware is the infamous …, first discovered in 2013.

CryptoLocker

FakeAV

Rombertik

CryptoWall

Xem đáp án
3. Trắc nghiệm
1 điểmKhông giới hạn

SQL injection is based on what?

Having database admin privileges.

Creating an SQL statement that will force access.

Creating an SQL statement that is always true.

Xem đáp án
4. Trắc nghiệm
1 điểmKhông giới hạn

What class would the IP address of 193.44.34.12 be?

A

B

C

D

Xem đáp án
5. Trắc nghiệm
1 điểmKhông giới hạn

What kind of connection type has 155 Mbps speed?

ISDN

T1

T3

OC3

Xem đáp án
6. Trắc nghiệm
1 điểmKhông giới hạn

What kind of connection type has 1.54 Mbps speed?

ISDN

T1

T3

OC3

Xem đáp án
7. Trắc nghiệm
1 điểmKhông giới hạn

What is SAM?

Security Accounts Manager

Service Access Manager

Service Accounts Media

Xem đáp án
8. Trắc nghiệm
1 điểmKhông giới hạn

Which layer of the OSI model is divided into two sublayers?

Data link

Network

Presentation

Session

Xem đáp án
9. Trắc nghiệm
1 điểmKhông giới hạn

What does HTTP mean?

Hypertext Transmission Protocol

Hypertext Transfer Protocol

High Text Transfer Protocol

High Text Transmission Protocol

Xem đáp án
10. Trắc nghiệm
1 điểmKhông giới hạn

What kind of cable has 40Gbps speed?

Category 5

Category 8

Category 6

Category 7

Xem đáp án
11. Trắc nghiệm
1 điểmKhông giới hạn

Recall that the second way a virus scanner works is to watch for certain types of behaviors that are … of a virus. This might include any program that attempts to write to your hard drive’s boot sector, change system files, automate your email software, or self-multiply. Programs that attempt to modify the system Registry (for Windows systems) or alter any system settings may also be indicative of a virus.

typical

type

typically

Xem đáp án
12. Trắc nghiệm
1 điểmKhông giới hạn

What is the malware?

a generic term for software that has a malicious purpose

an antivirus security software for computer

unknown software which steal user information

software which protect computer system

Xem đáp án
13. Trắc nghiệm
1 điểmKhông giới hạn

Rombertik uses the … to read user credentials to websites. It is most often sent as an attachment to an email. Perhaps even worse, in some situations it will either … the master boot record on the hard drive, making the machine unbootable, or begin encrypting files in the user’s home directory.

application / clear

tool / clean

browser / overwrite

mail reader / block

Xem đáp án
14. Trắc nghiệm
1 điểmKhông giới hạn

What is spyware?

Any software that monitors your system

Only software that logs keystrokes

Any software used to gather intelligence

Only software that monitors what websites you visit

Xem đáp án
15. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following is a vulnerability scanner specifically for Windows systems?

Nmap.

OphCrack.

Nessus.

Xem đáp án
16. Trắc nghiệm
1 điểmKhông giới hạn

A …, no matter what type you get, is basically a tool to block certain traffic.

hub

router

firewall

Xem đáp án
17. Trắc nghiệm
1 điểmKhông giới hạn

A … hacker is normally a law-abiding citizen, but in some cases will venture into illegal activities

white hat

blue hat

black hat

gray hat

Xem đáp án
18. Trắc nghiệm
1 điểmKhông giới hạn

IDS is

Intrusion Detection System

Internet Data Storage

Information Defense System

Integrated Database Software

Xem đáp án
19. Trắc nghiệm
1 điểmKhông giới hạn

A person who uses hacking techniques for illegal activities is referred to as what?

A cracker

A hacker

A gray hat hacker

Xem đáp án
20. Trắc nghiệm
1 điểmKhông giới hạn

Of course, just one machine in your classroom or lab that is simply pinging on your web server is not going to ......... affect the web server

adversity

adversely

adversing

adversed

Xem đáp án
21. Trắc nghiệm
1 điểmKhông giới hạn

What factor about the Sobig virus made it most intriguing to security experts?

It was difficult to protect against.

It was very sophisticated.

It spread in multiple ways.

Xem đáp án
22. Trắc nghiệm
1 điểmKhông giới hạn

Choose the wrong feature of computer virus.

Some viruses can hide the changes they make, making it much more difficult for the virus is detected.

The virus can bring other viruses: A virus can lead to another virus making it much more lethal and help each other to hide or even assist you to infect a particular section of the computer.

Mutations in the genetic code cause new virus strains to appear, and the pressures of natural selection allow some of these strains to evolve into entirely new species of viruses.

A virus is capable of being a resident, that is first loaded into memory and then infects the computer. It can also be non-resident when the virus code is executed only every time a file is opened.

Xem đáp án
23. Trắc nghiệm
1 điểmKhông giới hạn

What protocol is used for remotely logging on to a computer?

Telnet

HTTP

DNS

SMTP

Xem đáp án
24. Trắc nghiệm
1 điểmKhông giới hạn

A key logger is what type of malware?

Buffer overflow.

Trojan horse.

Spyware.

Xem đáp án
25. Trắc nghiệm
1 điểmKhông giới hạn

If you send a packet (a unit of data transmission) from one computer to another, a copy of that packet is actually sent out from every port on the …

hub

proxy

router

converter

Xem đáp án
26. Trắc nghiệm
1 điểmKhông giới hạn

Likewise, ......DoS attacks use much more sophisticated methods.

actualy

actual

factual

nowadays

Xem đáp án
27. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following is the safest way to send and receive attachments?

Use encryption.

Use virus scanners before opening attachments.

Use a code word indicating the attachment is legitimate.

Xem đáp án
28. Trắc nghiệm
1 điểmKhông giới hạn

Firewalls and proxy servers guard the perimeter by … and …

analyzing traffic / redirecting data to another place

redirecting data to another place / blocking all traffic

analyzing traffic / blocking traffic that has been disallowed by the administrator

faking IP / removing all of the operand

Xem đáp án
29. Trắc nghiệm
1 điểmKhông giới hạn

What kind of cable has low-speed analog and uses for telephone,doorbell?

Category 5

Category 7

Category 1

Category 4

Xem đáp án
30. Trắc nghiệm
1 điểmKhông giới hạn

Which of the following is a popular port scanner?

Nmap

OphCrack.

Nessus.

Xem đáp án
© All rights reserved VietJack