30 câu hỏi
It is transmitted as a zip file attached to an email. The email claims that the zip file contains data related to an invoice, tax issue, or similar urgent paperwork. This is a classic example of attempting to entice the recipient to open the attachment. What is it?
CryptoLocker
MacDefender
W32/Netsky-P
Troj/Invo-Zip
A packet is a certain number of bytes divided into a … and a …
header / body
upper / downer
left part / right part
body / conclude
The most desirable approach to security is one that is which of the following?
Perimeter and dynamic
Layered and dynamic
Perimeter and static
Layered and static
At a minimum, a firewall will … incoming packets based on certain parameters such as packet size, source IP address, protocol, and destination port.
block
save
filter
It establishes encrypted communication between infected computers and the command and control computer, allowing the attacker to control the various infected computers. What is it?
Rombertik
FakeAV
Gameover ZeuS
The Sobig Virus
What is the term for hacking a phone system?
Telco-hacking
Hacking
Cracking
Phreaking
The most common way for a virus to spread is as an email attachment. This realization leads to some simple rules that will drastically reduce the odds of becoming infected with a virus. What is wrong rule?
Use a virus scanner.
Believe “security alerts” that are sent to you.
If you are not sure about an attachment, do not open it.
You might even exchange a code word with friends and colleagues.
What kind of connection type has 2.5 Gbps speed?
ISDN
T1
T3
OC48
Virus is …
a small program that replicates and hides itself inside other programs, usually without your knowledge
a big program that replicates and hides itself inside other programs, usually without your knowledge
a small, repetitive and easily recognizable program inside other programs, usually without your knowledge
a big, repetitive and easily recognizable program inside other programs, usually without your knowledge
What is CERT?
Computer Emergency Response Team
Computer Emergency Reply Team
Computer Exit Response Team
Computer Exit Reply Team
A virus will usually spread primarily in one of two ways. The second is to … your email address book and … itself to everyone in your address book. Programming this is a trivial task, which explains why it is so common.
read / email
copy / replicate
destroy / send
This is any attack that attempts to breach your website
Session hijacking
Insider threats
Web attacks
DNS poisoning
The attacker is limited only by her … of SQL and the target database system
privilege
knowledge
desire
What does virulent mean?
The term virulent means a technique that generates a fixed length value summarising a file or message contents.
The term virulent means a term for a program that looks benign but actually has a malicious purpose.
The term virulent means essentially the same thing in reference to a computer virus as it does to a biological virus. It is a measure of how rapidly the infection spreads and how easily it infects new targets.
The term virulent means copying itself to the Windows directory as avserve.exe and creates a Registry key to load itself at startup.
This virus, which first appeared in 2012, targeted Windows operating systems. The first item that makes this virus notable is that it was specifically designed by the U.S. government for espionage. It was discovered in May 2012 at several locations, including Iranian government sites. It is spyware that can monitor network traffic and take screenshots of the infected system. What is it?
The Bagle virus
Flame
The Mimail virus
A Nonvirus virus
What year marked the beginning of widespread distribution of the UNIX operating system?
1976
1978
1980
1982
Which utility gives you information about your machine's network configuration?
Ping
IPConfig
Tracert
MyConfig
What is a computer virus?
Any program that is downloaded to your system without your permission
Any program that self-replicates
Any program that causes harm to your system
Any program that can change your Windows Registry
The IP address of 127.0.0.1 always refers to your what?
Nearest router
ISP
Self
Nearest NAP
A set of … determine what traffic to allow in and what traffic to block. Obviously, a firewall is a critical piece of your security strategy.
devices
the administrators
rules
What port does SMTP use?
25
24
22
23
one of the most ......... forms of attack on a system is a DoS.
common and simple
common and simplest
commonly and simplest
commonest
The first step in understanding computer and network security is ... a realistic assessment of the threats to those systems
to formulate
calculating
disposed
constructing
If you want to connect more than two computer directly, what device can not help you to accomplish this task?
Proxy
Hub
Router
Switch
You can do a rather .......... denial of service attack on the system
primitive
primordial
prime
This sort of DoS is easy to........, and it can be hard to stop.
make
do
begin
star
When was the bird of the TCP/IP protocol?
1973
1974
1975
1976
What is doxing?
is what translates the domain names you and I understand (like www.ChuckEasttom.com) into IP addresses that computers and routers understand
is the process of finding personal information about an individual and broadcasting it, often via the Internet
is actually a much greater problem than many people appreciate. Within an organization, information security is often more lax than it should be
is simply when someone inside your organization either misuses his access to data or accesses data he is not authorized to access
The attacker uses a small private drone equipped with Wi-Fi sniffing and cracking software, flies the drone in the area of interest, and attempts to gain access to wireless networks. What is this type of attack?
war-driving
war-dialing
war-dying
war-flying
The most desirable approach to security is one that is which of the following?
Perimeter and dynamic
Layered and dynamic
Perimeter and static
Layered and static
