Multiple choice questions about network security implementation have the answer P7

In the quiz below, the network administrator will send you the notes when using the network to ensure your safety. Invite your reference.

  1. Question 1. The technique of stealing accounts with Keylog is often used by newbie Hacker users because:
    1. Keylog is very powerful in identifying user / password in outbound packets
    2. Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
    3. Because most users are not interested in security issues and Anti Virus
    4. It is difficult to be detected by Anti Virus programs
  2. Question 2. To execute a Trojan-Backdoor attack. Hackers will do it
    1. The Trojan Server is installed on the victim's computer - Hacker controls with the Trojan Client
    2. The hacker uses a Trojan Client to attack the victim's computer via ports received from Scanning technology
    3. Hackers use a Trojan Server, attack the victim's machine through the ports received from Scanning technology
    4. The Trojan Client is installed on a victim's computer - Hacker is controlled by a Trojan Server
  3. Question 3. How do computer worms and other viruses spread?
    1. Automatically spread and infect between systems
    2. Spread through attachments with email
    3. It is almost impossible to spread unless you open or run an infected program
    4. Spread through email content
  4. Question 4. Is the information system divided into several main parts?
    1. first
    2. 2
    3. 3
    Information system is divided into 3 main parts: hardware, software and connection
  5. Question 5. In 1992 and revised in 2002, OECD's guidance on security for information and network systems has exported many basic principles:
    1. 8
    2. 9
    3. ten
  6. Question 6. In 2004, how many basic principles did the NIST organization propose?

    1. 32
    2. 33
    3. 34
  7. Question 7. RFID - What is Radio Frequency Identification?
    1. Biometric identification
    2. Identify via RF signals with the information to be determined
    3. Image recognition
    4. Not the above forms
  8. Question 8. How many basic elements of information does the CIA triangle model have?
    1. 6
    2. 7
    3. 8
    4. 9
    These factors are: confidentiality (confidentiality), possession (possession), integrity (integrity), authentication (authenticity), availability (availability) and utility.
  9. Question 9. What are the targets that hackers target before performing attacks on TCP / IP networks?
    1. 'Impersonation' must be achieved: To be able to perform unauthorized access to network resources (data).
    2. 'Replay of messages' must be done: To be able to access / receive information and change it, when the information is moving on the road.
    3. Must guess the key (Guessing of key): To be able to access the password and encrypted data (called "rough" attack: brute-force attack).
    4. All answers are correct
  10. Question 10. What is the type of denial of service attack:
    1. DoS
    2. DDoS
    3. Both types above
    There are two types of denial of service attacks: DoS (Denny of Service)

You've just finished reading the article "Multiple choice questions about network security implementation have the answer P7" edited by the TipsMake team. You can save multiple-choice-questions-about-network-security-implementation-have-the-answer-p7.pdf to your computer here to read later or print it out. We hope this article has provided you with many useful tech tips and tricks. You can search for similar articles on tips and guides. Thank you for reading and for following us regularly.

« PREV Set of multiple choice questions for programming with P15 prize
NEXT » Test on JAVA test on P9