12.5.11 Practice Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the main difference between a worm and a virus?

A worm can replicate itself, while a virus requires a host for distribution.

While browsing the internet, you notice that the browser displays ads linked to recent keyword searches you performed. Which attack type is this an example of?

Adware

Which of the following BEST describes the key difference between DoS and DDoS?

Attackers use numerous computers and connections.

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Brute force attack

Which of the following is a text file that a website stores on a client's hard drive to track and record information about the user?

Cookie

Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps hostnames to IP addresses?

DNS poisoning

Which of the following is an attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial-of-service attack

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

Dumpster diving

As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. You check your company's Password Policy and find that the following settings are currently required: Minimum password length = 10 Minimum password age = 4 Maximum password age = 30 Password history = 6 Account lockout clipping level = 3 Require complex passwords that include numbers and symbols Which of the following is the best action to take to make remembering passwords easier so that the user no longer has to write their password down?

Implement end user training.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

What should you try first if your antivirus software does not detect and remove a virus?

Update your virus detection software.


Set pelajaran terkait

Section 5: Relationship Fundamentals Quiz

View Set

Amendment Process, Documents that influenced the writing of the Constitution of the United States of America, Fundamental Principles - CE 2A-D

View Set

BA 316 Chapter 8 Organizational Structure, Design, & Culture

View Set

Iggy Chapter 47 Care of Patient w/ Musculoskeletal Trauma

View Set