30 câu hỏi
Any computer system, web server, or network can only .........a finite load.
handle
lead
request
Which of the following is a way that any person can use to protect against virus attacks?
Use encrypted transmissions.
Use secure email software.
Never open unknown email attachments.
… is embedded in some web pages, and when a user visits those web pages, she is given a fake virus scan that tells her she has a virus and it needs to be fixed. The “fix” is actually downloading a virus.
CryptoLocker
MacDefender
Rombertik
Troj/Invo-Zip
What virus exploited buffer overflows?
Mimail virus.
Bagle virus.
Sasser virus.
In general, there are five ways a virus scanner might scan for virus infections:
Email and attachment scanning, Download scanning, File scanning, Server scanning, Sandbox
Email and attachment scanning, Download scanning, File scanning, Heuristic scanning, Sandbox
disk scanning
Running an Apache web server on a simple laptop running Windows 7 Home Edition, it can take about 15 machines each running about 10 different command windows ........pinging to cause a web server to stop responding to legitimate requests.
contemporary
simultaneously
coeval
thus
Which button is used to get to the boot menu?
F9
F12
F10
a hacker might develop a small virus whose sole purpose is to infect as many computers as possible and then get each of the ........ computers to initiate a DoS attack on the target.
infect
infected
infecting
infection
Which of the following is true regarding emailed security alerts?
You can trust attachments on security alerts.
Most companies send alerts via email.
Most companies do not send alerts via email.
A protocol that translates web addresses into IP addresses is called what?
DNS
TFTP
DHCP
SMTP
This was a fake antivirus that would pop up fake virus warnings. What is this?
CryptoLocker
FakeAV
Rombertik
CryptoWall
Rombertik wreaked havoc in ....
2013
2014
2015
2016
A number of people who call themselves hackers, though, are not as skilled as they claim to be. They have .... a few buzzwords from the Internet and may be convinced of their own digital supremacy, but they are not able to effect any real compromises to even a moderately secure system
Ascertained
Proved
Demonstrated
Evidenced
What is the primary way a virus scanner works?
By blocking all unknown files.
By looking at files for virus-like behavior.
By comparing files against a list of known virus profiles.
In Chapter 3, “Cyber Stalking, Fraud, and Abuse,” you were introduced to some fraud, ........., and related crimes
stalker
stalking
Stalked
What are the three approaches to security?
Perimeter, layered, hybrid
High security, medium security, low security
Internal, external, and hybrid
Perimeter, complete, none
In this attack, the perpetrator will boot the system to any Linux live CD. Then, using the FDISK utility, the attacker will locate the Windows partition. Navigating to the Windows\System32 directory, the attacker can first take magnify.exe and make a backup, perhaps naming the backup magnify.bak. Then she can take command.exe (the command prompt) and rename it magnify.exe. What is this attack?
login as system
pass the hash
net user scripts
What is the most common threat on the Internet?
Auction fraud
Hackers
Computer viruses
Illegal software
This virus not only collected email addresses from your address book, but also from other documents on your machine (Gudmundsson, 2004). What is this?
The Bagle virus
MacDefender
The Mimail virus
A Nonvirus virus
What is abbreviation of DoS?
disk operating system
denial of service
distributed denial of service
deal of service
What port does DNS use?
53
24
22
23
This “mail reader” program is made by Mozilla Foundation. What is it?
Postbox
Outlook
Mailspring
Thunderbird
Standard telephone lines use … jacks
RJ-45
RJ-11
RJ-8600fe
RJ-9600s
The most basic security device is the
switch
proxy
firewall
Hub
… is perhaps the most demanding on bandwidth
Streaming media
Data transmission
Games online
Telephone
Any computer system, web server, or network can only handle a ........ load
unlimite
finite
finited
finicky
It is basically an intelligent hub. When it receives a packet, it will send that packet only out the port for the computer to which it needs to go
Switch
IPS
Adapter
Converter
A unique hexadecimal number that identifies your network card is called what?
A NIC address
A MAC address
A NIC ID
A MAC ID
With modern servers, and many servers actually being hosted in clusters or server ......., this exact illustration would not work against a modern target.
webs
farms
services
machines
The real question is this: How does spyware get onto a computer system in the first place? The most common method is a …. It is also possible that when you visit a certain website spyware may download in the background while you are simply perusing the website.
Nonvirus virus
Trojan horse
Mimail virus
