Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
MCQ.docx
Скачиваний:
16
Добавлен:
25.02.2016
Размер:
131.49 Кб
Скачать

Is assigned to a computer and may change the next time the computer connects to the network

198.

Which of the following statements is true about routers?

The router delivers the data directly to the host if the destination IP address exists in the router’s host table

199.

Internet domain names can be resolved to IP addresses using:

DNS

200.

Which of the following is used to carry digital signals over standard telephone lines?

ADSL

201.

Which of the following protocols handles reliable delivery of data and ensures correct ordering of data packets?

TCP

202.

Which of the following exposes users to a greater risk of packet sniffing?

Wireless access

203.

Which of the following is not a symptom of malicious code execution?

Beeps on POST sequence

204.

In a distributed denial of service attack, the requests to a system are sent by:

Zombies

205.

Which of the following helps prevent social engineering attacks?

Using data encryption

206.

Which of the following is not a symptom of a DoS attack?

Unexpected changes in file sizes or date/time stamps

207.

Which of the following is (are) true regarding distributed denial of service attacks? I. The source of the attack can be easily traced. II. These complex attacks are theoretical and have not yet occurred.

None

208.

Which of the following is not a type of malicious software program?

Data encryption utilities

209.

What type of viruses can affect Microsoft Excel and Microsoft Word documents?

Macro viruses

210.

What is a smurf attack?

Initiation of ping requests using a target system’s address

211.

Users on a network receive an email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not comply. What type of attack is this?

Spoofing

212.

Which of the following types of attackers are most likely to be involved in security breaches?

Internal or external personnel

213.

Which of the following types of attacks does not rely on a software tool?

Social engineering

214.

Which of the following is ineffective against packet sniffing attacks?

Changing passwords frequently

215.

Which of the following means of obtaining passwords involve trying all combinations of alphanumeric characters till the password has been cracked?

Brute force password cracking

216.

What type of malware can use your account privileges to install other programs such as programs that provide unauthorized network access?

Trojan Horse

217.

Which of the following attacks affect data availability?

Port scanning

218.

Which of the following attacks affect data confidentiality?

Packet sniffing

219.

What type of attack involves the initiate a half-open connection?

Denial of service attack

220.

Which of the following can help to prevent port-scanning attacks?

II. Close unused ports III. Monitor network usage and investigate suspicious activities

221.

What type of attacks does closing unused ports on a network prevent?

Port scanning

222.

Spamming an email server is an example of

Denial of service attacks

223.

What type of malicious software can execute itself on a vulnerable remote machine without requiring a user to execute it?

Worm

224.

Which of the following attaches itself to a file or software application, and then replicates itself on the host computer, spreading copies of itself to other files?

Virus

225.

An indication that the website being viewed uses encrypted communication is

A lock icon on the right of the status bar of the browser

226.

Which of the following protocols provides encryption between a web browser and web server?

SSL

227.

Symmetric encryption is also known as

Private key encryption

228.

The certificate authorities that the web browser is pre-configured to work with are referred to as:

Trusted root certification authorities

229.

Faulty certificate warning are displayed by the browser under which of the following conditions:

The system date is incorrect

230.

Which of the following are not hash code algorithms?

DES

231.

To encrypt a message using public-key encryption scheme, which of the following must be done?

Encrypt the message using the receiver's public key

232.

The process of transforming information so it is unintelligible to eavesdroppers is referred to as:

Encryption

233.

Hybrid encryption schemes are used because

Public key encryption is computationally intensive

234.

Which of the following is a good password?

The fourth letter of every sentence in a paragraph, with the password length exceeding 8 characters

235.

Which of the following does not constitute a typical enterprise public key infrastructure:

Web browsers for accessing intranet websites

236.

Why is a character-shift cipher considered ineffective?

It has a small keyspace

237.

How does the secure socket layer (SSL) verify the identity of the Web server requesting confidential data?

It uses the server's public key

238.

Which of the following does a digital certificate not contain?

Protocol used to exchange the certificate

239.

Where is a corporate firewall typically installed?

Between the internal corporate network and the Internet

240.

Which of the following is a program or hardware device that protects your network by filtering incoming packets from the Internet entering your protected network or computer system?

Firewall

241.

Which of the following statements about firewalls is true?

Packet filters provide coarse access control to administrators

242.

Which of the following statements is true?

Intrusion Detection Systems do not block traffic

243.

Which of the following takes the least time to perform

Incremental backup

244.

Which of the following does a firewall not help prevent?

Using stolen passwords in authorized applications

245.

To recover from data being compromised, tampered with, corrupted, or deleted, the following can be used

Data backups

246.

Which of the following provides the least time to recover from a data loss?

Full backup

247.

Which of the following is not a type of firewall

Packet sniffer

248.

Where can information about data blocked by a firewall be found?

Firewall’s log files

249.

Snort is a

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]