- •It must run without some of the protection mechanisms that guard against faulty instructions or illegal memory accesses.
- •Interrupt handlers have read-write access to the data an application stores in the registers
- •Vector graphics
- •It is an example of a code review
- •Integrated Development Environment
- •Identify the type of email attachment so a suitable program can be used to open the attachmen
- •Is assigned to a computer and may change the next time the computer connects to the network
- •Intrusion detection system
Is assigned to a computer and may change the next time the computer connects to the network
|
198. |
|
Which of the following statements is true about routers? |
|
The router delivers the data directly to the host if the destination IP address exists in the router’s host table
|
199. |
|
Internet domain names can be resolved to IP addresses using: |
|
DNS
|
200. |
|
Which of the following is used to carry digital signals over standard telephone lines? |
|
ADSL
|
201. |
|
Which of the following protocols handles reliable delivery of data and ensures correct ordering of data packets? |
|
TCP
202. |
|
Which of the following exposes users to a greater risk of packet sniffing? |
|
Wireless access
|
203. |
|
Which of the following is not a symptom of malicious code execution? |
|
Beeps on POST sequence
|
204. |
|
In a distributed denial of service attack, the requests to a system are sent by: |
|
Zombies
|
205. |
|
Which of the following helps prevent social engineering attacks? |
|
Using data encryption
|
206. |
|
Which of the following is not a symptom of a DoS attack? |
|
Unexpected changes in file sizes or date/time stamps
|
207. |
|
Which of the following is (are) true regarding distributed denial of service attacks? I. The source of the attack can be easily traced. II. These complex attacks are theoretical and have not yet occurred. |
|
None
|
208. |
|
Which of the following is not a type of malicious software program? |
|
Data encryption utilities
|
209. |
|
What type of viruses can affect Microsoft Excel and Microsoft Word documents? |
|
Macro viruses
|
210. |
|
What is a smurf attack? |
|
Initiation of ping requests using a target system’s address
|
211. |
|
Users on a network receive an email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not comply. What type of attack is this? |
|
Spoofing
|
212. |
|
Which of the following types of attackers are most likely to be involved in security breaches? |
|
Internal or external personnel
|
213. |
|
Which of the following types of attacks does not rely on a software tool? |
|
Social engineering
|
214. |
|
Which of the following is ineffective against packet sniffing attacks? |
|
Changing passwords frequently
|
215. |
|
Which of the following means of obtaining passwords involve trying all combinations of alphanumeric characters till the password has been cracked? |
|
Brute force password cracking
|
216. |
|
What type of malware can use your account privileges to install other programs such as programs that provide unauthorized network access? |
|
Trojan Horse
|
217. |
|
Which of the following attacks affect data availability? |
|
Port scanning
|
218. |
|
Which of the following attacks affect data confidentiality? |
|
Packet sniffing
|
219. |
|
What type of attack involves the initiate a half-open connection? |
|
Denial of service attack
|
220. |
|
Which of the following can help to prevent port-scanning attacks? II. Close unused ports III. Monitor network usage and investigate suspicious activities |
|
|
221. |
|
What type of attacks does closing unused ports on a network prevent? |
|
Port scanning
|
222. |
|
Spamming an email server is an example of |
|
Denial of service attacks
|
223. |
|
What type of malicious software can execute itself on a vulnerable remote machine without requiring a user to execute it? |
|
Worm
|
224. |
|
Which of the following attaches itself to a file or software application, and then replicates itself on the host computer, spreading copies of itself to other files? |
|
Virus
225. |
|
An indication that the website being viewed uses encrypted communication is |
|
A lock icon on the right of the status bar of the browser
|
226. |
|
Which of the following protocols provides encryption between a web browser and web server? |
|
SSL
|
227. |
|
Symmetric encryption is also known as |
|
Private key encryption
|
228. |
|
The certificate authorities that the web browser is pre-configured to work with are referred to as: |
|
Trusted root certification authorities
|
229. |
|
Faulty certificate warning are displayed by the browser under which of the following conditions: |
|
The system date is incorrect
|
230. |
|
Which of the following are not hash code algorithms? |
|
DES
|
231. |
|
To encrypt a message using public-key encryption scheme, which of the following must be done? |
|
Encrypt the message using the receiver's public key
|
232. |
|
The process of transforming information so it is unintelligible to eavesdroppers is referred to as: |
|
Encryption
|
233. |
|
Hybrid encryption schemes are used because |
|
Public key encryption is computationally intensive
|
234. |
|
Which of the following is a good password? |
|
The fourth letter of every sentence in a paragraph, with the password length exceeding 8 characters
|
235. |
|
Which of the following does not constitute a typical enterprise public key infrastructure: |
|
Web browsers for accessing intranet websites
|
236. |
|
Why is a character-shift cipher considered ineffective? |
|
It has a small keyspace
|
237. |
|
How does the secure socket layer (SSL) verify the identity of the Web server requesting confidential data? |
|
It uses the server's public key
|
238. |
|
Which of the following does a digital certificate not contain? |
|
Protocol used to exchange the certificate
239. |
|
Where is a corporate firewall typically installed? |
|
Between the internal corporate network and the Internet
|
240. |
|
Which of the following is a program or hardware device that protects your network by filtering incoming packets from the Internet entering your protected network or computer system? |
|
Firewall
|
241. |
|
Which of the following statements about firewalls is true? |
|
Packet filters provide coarse access control to administrators
|
242. |
|
Which of the following statements is true? |
|
Intrusion Detection Systems do not block traffic
|
243. |
|
Which of the following takes the least time to perform |
|
Incremental backup
|
244. |
|
Which of the following does a firewall not help prevent? |
|
Using stolen passwords in authorized applications
|
245. |
|
To recover from data being compromised, tampered with, corrupted, or deleted, the following can be used |
|
Data backups
|
246. |
|
Which of the following provides the least time to recover from a data loss? |
|
Full backup
|
247. |
|
Which of the following is not a type of firewall |
|
Packet sniffer
|
248. |
|
Where can information about data blocked by a firewall be found? |
|
Firewall’s log files
|
249. |
|
Snort is a |
|