vietjack.com

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 9
Quiz

300+ câu trắc nghiệm tiếng anh chuyên nghành bảo mật thông tin có đáp án - Phần 9

V
VietJack
Đại họcTrắc nghiệm tổng hợp10 lượt thi
30 câu hỏi
1. Trắc nghiệm
1 điểmKhông giới hạn

It is transmitted as a zip file attached to an email. The email claims that the zip file contains data related to an invoice, tax issue, or similar urgent paperwork. This is a classic example of attempting to entice the recipient to open the attachment. What is it?

CryptoLocker

MacDefender

W32/Netsky-P

Troj/Invo-Zip

Xem đáp án
2. Trắc nghiệm
1 điểmKhông giới hạn

A packet is a certain number of bytes divided into a … and a …

header / body

upper / downer

left part / right part

body / conclude

Xem đáp án
3. Trắc nghiệm
1 điểmKhông giới hạn

The most desirable approach to security is one that is which of the following?

Perimeter and dynamic

Layered and dynamic

Perimeter and static

Layered and static

Xem đáp án
4. Trắc nghiệm
1 điểmKhông giới hạn

At a minimum, a firewall will … incoming packets based on certain parameters such as packet size, source IP address, protocol, and destination port.

block

save

filter

Xem đáp án
5. Trắc nghiệm
1 điểmKhông giới hạn

It establishes encrypted communication between infected computers and the command and control computer, allowing the attacker to control the various infected computers. What is it?

Rombertik

FakeAV

Gameover ZeuS

The Sobig Virus

Xem đáp án
6. Trắc nghiệm
1 điểmKhông giới hạn

What is the term for hacking a phone system?

Telco-hacking

Hacking

Cracking

Phreaking

Xem đáp án
7. Trắc nghiệm
1 điểmKhông giới hạn

The most common way for a virus to spread is as an email attachment. This realization leads to some simple rules that will drastically reduce the odds of becoming infected with a virus. What is wrong rule?

Use a virus scanner.

Believe “security alerts” that are sent to you.

If you are not sure about an attachment, do not open it.

You might even exchange a code word with friends and colleagues.

Xem đáp án
8. Trắc nghiệm
1 điểmKhông giới hạn

What kind of connection type has 2.5 Gbps speed?

ISDN

T1

T3

OC48

Xem đáp án
9. Trắc nghiệm
1 điểmKhông giới hạn

Virus is …

a small program that replicates and hides itself inside other programs, usually without your knowledge

a big program that replicates and hides itself inside other programs, usually without your knowledge

a small, repetitive and easily recognizable program inside other programs, usually without your knowledge

a big, repetitive and easily recognizable program inside other programs, usually without your knowledge

Xem đáp án
10. Trắc nghiệm
1 điểmKhông giới hạn

What is CERT?

Computer Emergency Response Team

Computer Emergency Reply Team

Computer Exit Response Team

Computer Exit Reply Team

Xem đáp án
11. Trắc nghiệm
1 điểmKhông giới hạn

A virus will usually spread primarily in one of two ways. The second is to … your email address book and … itself to everyone in your address book. Programming this is a trivial task, which explains why it is so common.

read / email

copy / replicate

destroy / send

Xem đáp án
12. Trắc nghiệm
1 điểmKhông giới hạn

This is any attack that attempts to breach your website

Session hijacking

Insider threats

Web attacks

DNS poisoning

Xem đáp án
13. Trắc nghiệm
1 điểmKhông giới hạn

The attacker is limited only by her … of SQL and the target database system

privilege

knowledge

desire

Xem đáp án
14. Trắc nghiệm
1 điểmKhông giới hạn

What does virulent mean?

The term virulent means a technique that generates a fixed length value summarising a file or message contents.

The term virulent means a term for a program that looks benign but actually has a malicious purpose.

The term virulent means essentially the same thing in reference to a computer virus as it does to a biological virus. It is a measure of how rapidly the infection spreads and how easily it infects new targets.

The term virulent means copying itself to the Windows directory as avserve.exe and creates a Registry key to load itself at startup.

Xem đáp án
15. Trắc nghiệm
1 điểmKhông giới hạn

This virus, which first appeared in 2012, targeted Windows operating systems. The first item that makes this virus notable is that it was specifically designed by the U.S. government for espionage. It was discovered in May 2012 at several locations, including Iranian government sites. It is spyware that can monitor network traffic and take screenshots of the infected system. What is it?

The Bagle virus

Flame

The Mimail virus

A Nonvirus virus

Xem đáp án
16. Trắc nghiệm
1 điểmKhông giới hạn

What year marked the beginning of widespread distribution of the UNIX operating system?

1976

1978

1980

1982

Xem đáp án
17. Trắc nghiệm
1 điểmKhông giới hạn

Which utility gives you information about your machine's network configuration?

Ping

IPConfig

Tracert

MyConfig

Xem đáp án
18. Trắc nghiệm
1 điểmKhông giới hạn

What is a computer virus?

Any program that is downloaded to your system without your permission

Any program that self-replicates

Any program that causes harm to your system

Any program that can change your Windows Registry

Xem đáp án
19. Trắc nghiệm
1 điểmKhông giới hạn

The IP address of 127.0.0.1 always refers to your what?

Nearest router

ISP

Self

Nearest NAP

Xem đáp án
20. Trắc nghiệm
1 điểmKhông giới hạn

A set of … determine what traffic to allow in and what traffic to block. Obviously, a firewall is a critical piece of your security strategy.

devices

the administrators

rules

Xem đáp án
21. Trắc nghiệm
1 điểmKhông giới hạn

What port does SMTP use?

25

24

22

23

Xem đáp án
22. Trắc nghiệm
1 điểmKhông giới hạn

one of the most ......... forms of attack on a system is a DoS.

common and simple

common and simplest

commonly and simplest

commonest

Xem đáp án
23. Trắc nghiệm
1 điểmKhông giới hạn

The first step in understanding computer and network security is ... a realistic assessment of the threats to those systems

to formulate

calculating

disposed

constructing

Xem đáp án
24. Trắc nghiệm
1 điểmKhông giới hạn

If you want to connect more than two computer directly, what device can not help you to accomplish this task?

Proxy

Hub

Router

Switch

Xem đáp án
25. Trắc nghiệm
1 điểmKhông giới hạn

You can do a rather .......... denial of service attack on the system

primitive

primordial

prime

Xem đáp án
26. Trắc nghiệm
1 điểmKhông giới hạn

This sort of DoS is easy to........, and it can be hard to stop.

make

do

begin

star

Xem đáp án
27. Trắc nghiệm
1 điểmKhông giới hạn

When was the bird of the TCP/IP protocol?

1973

1974

1975

1976

Xem đáp án
28. Trắc nghiệm
1 điểmKhông giới hạn

What is doxing?

is what translates the domain names you and I understand (like www.ChuckEasttom.com) into IP addresses that computers and routers understand

is the process of finding personal information about an individual and broadcasting it, often via the Internet

is actually a much greater problem than many people appreciate. Within an organization, information security is often more lax than it should be

is simply when someone inside your organization either misuses his access to data or accesses data he is not authorized to access

Xem đáp án
29. Trắc nghiệm
1 điểmKhông giới hạn

The attacker uses a small private drone equipped with Wi-Fi sniffing and cracking software, flies the drone in the area of interest, and attempts to gain access to wireless networks. What is this type of attack?

war-driving

war-dialing

war-dying

war-flying

Xem đáp án
30. Trắc nghiệm
1 điểmKhông giới hạn

The most desirable approach to security is one that is which of the following?

Perimeter and dynamic

Layered and dynamic

Perimeter and static

Layered and static

Xem đáp án
© All rights reserved VietJack