30 câu hỏi
Find the wrong ideal: “Sometimes a firewall takes the form of …”
a standalone server
a switch layer 2
a router
software running on a machine
Which of the following is the best definition of the term sensitive information?
Any information that has impact on national security
Any information that is worth more than $1,000
Any information that if accessed by unauthorized personnel could damage your organization in any way
Any information that is protected by privacy laws
The old adage that “knowledge is power” is not only good advice, but also an axiom upon which to ........your entire security outlook.
build
train
support
W32/Netsky-P was first found in … and was still going around in 2011.
2004
2005
2006
2007
Which of the following is the most basic security activity?
Authentication
Firewalls
Password protection
Auditing
What kind of cable has 10Gbps speed and uses for high-speed network?
Category 3
Category 6a
Category 4
Category 6
A … virus literally changes its form from time to time to avoid detection by antivirus software.
polymorphic
sparse infector
boot sector
macro
DoS and DDoS attacks are becoming even more ...........
prevailing
prevalent
prevalence
preval
A … hacker , upon finding some flaw in a system, will report the flaw to the vendor of that system.
white hat
blue hat
black hat
gray hat
FakeAV first appeared in … 2012.
October
September
July
March
Many office products, including Microsoft Office, allow users to write mini-programs called ...
macro
armored
memory resident
Trojan
Outlook is designed so that a programmer can write scripts using a subset of the Visual Basic programming language, called VBA. What is VBA?
Visual Basic Applications
Visual Basic for Applications
Virtual Basic Applications
Visual Basic Address
The cable used in networks is also referred to as what?
Unshielded twisted-pair
Shielded twisted-pair
Unshielded untwisted-pair
Shielded untwisted-pair
Which of the following types of privacy law affects computer security?
Any state privacy law
Any privacy law applicable to your organization
Any privacy law
Any federal privacy law
This group of attacks includes any attempt to gain unauthorized access to your system. This includes cracking passwords, elevating privileges, breaking into a server…all the things you probably associate with the term hacking
Malware
DoS attacks
Session hijacking
Security breaches
A person who hacks into phone systems is referred to as what?
A cracker
A gray hat hacker
A phreaker
Which of the following is the primary reason that Outlook is so often a target for virus attacks?
Outlook copies virus files faster.
Outlook is more common than other email systems.
It is easy to write programs that access Outlook’s inner mechanisms.
Which of the following is considered the most stealthy port scan?
Nmap
Ping
SYN
Who assess system vulnerabilities?
Hacker
Penetration tester
Lawer
Network Administrator
What kind of cable has analog line (less than 10MHz) and uses for telephone?
Category 4
Category 2
Category 1
Category 3
What does ‘finite” mean?
finish
limit
end
A … is a device used to boost signal.
Switch
Hub
Repeater
Proxy
Malware is the abbreviation of ...
malevolent-logic software
malicious-logic software
malic software
malevolently software
A … is often used with a … to hide the internal network’s IPaddress and present a single IP address (its own) to the outside world.
router / switch
hub / proxy
proxy server / firewall
IDS / DNS server
What is the basic purpose of a cable in the network computer?
Transmit packets from one machine to another
Power transfer between devices
Assess the ability to connect between devices
Prevents communication between two devices
What web server service can you use that mentions Computer Security Fundamentals?
Window7/8/8.1/10
Apache, IIS, or any web server
vFabric Web Server 5.1.1
All answers are correct
What does FTP mean?
File Transmission Protocol
File Transfer Protocol
File Transfer Protection
File Transmission Protection
An … virus scanner runs in the background and is constantly checking your PC for any sign of a virus.
ongoing
ingoing
outgoing
A workload for a computer system may be defined by the number of simultaneous users, the size of files, the speed of data transmission, or the ..........data stored.
lot of
amount of
larger of
An … IDS or IPS takes the added step of shutting down the suspect communication.
active
quick
smart
