b. Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
c. Because most users are not interested in security issues and Anti Virus
d. It is difficult to be detected by Anti Virus programs
Question 2 . To execute a Trojan-Backdoor attack. Hackers will do:
a. Trojan Server is installed on the victim machine. Hacker controls with the Trojan Client
b. The hacker uses a Trojan Client, attacking the victim's computer through the ports received from Scanning technology.
c. Hackers use a Trojan Server, attack the victim's computer through ports received from Scanning technology.
d. Trojan Client is installed on the victim machine. Hacker controlled by Trojan Server
Question 3. Trojan is a type of attack method:
a. Direct intervention on the victim's machine for important information
b. Stealing data from online victims
c. Attack cripples the victim's network
d. Control the victim computer remotely via the built-in software on the victim's computer
Question 4 . Metasploit Framework is an attack tool that exploits the vulnerability to get Shell of the victim machine. Immediately after installation, running this tool is a problem: all typing commands on Metasploit are not executed. The reason is:
a. Do not connect to the victim machine.
b. Do not install Metasploit tool on drive C:
c. Because the victim machine does not allow attacks.
d. Because the Anti Virus software on the hacked device is blocked (blocked) is not enforced.
Question 5 . System Hacking is a type of attack method:
a. Control remote victim computer
b. Direct intervention on the victim's machine for important information
c. Attack cripples the victim's network
d. Stealing data from online victims
Question 6 . Sniffing is a type of attack method:
a. Control remote victim computer
b. Stealing data from online victims
c. Direct intervention on the victim's machine for important information
d. Attack cripples the victim's network
Question 7 . Computer viruses cannot spread through
a. Internet
b. CD
c. Flash memory card
d. USB storage
Question 8 . Which program is an antivirus program
a. Kaspersky
b. Microsoft Office
c. Outlook Express
d. Winrar
Question 9 . Why is it dangerous to open email attachments
a. Because e-mail attachments are a source of computer virus infection
b. Because when opening an attachment, the service must be paid
c. Because the attachment is large, the computer cannot hold it
d. For all the above reasons
Question 10 . What file types can spread viruses
a. EXE
b. COM
c. BAT
d. All files above
Question 11 What is a computer virus?
a. A disease that can spread to people when accessing the Internet
b. A program or program segment is capable of replicating or copying itself from one infected object to another
c. One person accesses another's computer to copy files in an invalid way
d. Answers B and C are correct
Question 12 Please choose the right statement in the following statements:
a. Just an antivirus software is able to kill all viruses.
b. At one point a virus scanning software only killed some
certain viruses
c. A virus scanning software only kills a single virus
d. Computers that are not connected to the Internet are not infected
Question 13 . Which routes spread computer viruses:
a. Via USB memory device, removable drive.
b. Through file copy
c. Via black web, through software crack, keygen
d. All 3 plans on
Verse 14 . Harm of computer viruses
a. Consume system resources.
b. Destroy or steal data
c. Irritating to users
d. All 3 plans on
Question 15 . Which programs are not antivirus programs?
a. Kaspersky
b. Norton AntilVirus
c. BKAV
d. Winrar
Answer:
1 C
2 A
3. D
4. D
5. B
6. B
7. B
8. A
9. A
10. D
11. B
12. B
13. D
14. D
15. D
See more: