Multiple choice questions about network security implementation have the answer P7
In the quiz below, the network administrator will send you the notes when using the network to ensure your safety. Invite your reference.
- Question 1. The technique of stealing accounts with Keylog is often used by newbie Hacker users because:
- Keylog is very powerful in identifying user / password in outbound packets
- Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
- Because most users are not interested in security issues and Anti Virus
- It is difficult to be detected by Anti Virus programs
-
- Question 2. To execute a Trojan-Backdoor attack. Hackers will do it
- The Trojan Server is installed on the victim's computer - Hacker controls with the Trojan Client
- The hacker uses a Trojan Client to attack the victim's computer via ports received from Scanning technology
- Hackers use a Trojan Server, attack the victim's machine through the ports received from Scanning technology
- The Trojan Client is installed on a victim's computer - Hacker is controlled by a Trojan Server
-
- Question 3. How do computer worms and other viruses spread?
- Automatically spread and infect between systems
- Spread through attachments with email
- It is almost impossible to spread unless you open or run an infected program
- Spread through email content
-
- Question 4. Is the information system divided into several main parts?
- first
- 2
- 3
-
- Question 5. In 1992 and revised in 2002, OECD's guidance on security for information and network systems has exported many basic principles:
- 8
- 9
- ten
-
- Question 6. In 2004, how many basic principles did the NIST organization propose?
- 32
- 33
- 34
-
- Question 7. RFID - What is Radio Frequency Identification?
- Biometric identification
- Identify via RF signals with the information to be determined
- Image recognition
- Not the above forms
-
- Question 8. How many basic elements of information does the CIA triangle model have?
- 6
- 7
- 8
- 9
-
- Question 9. What are the targets that hackers target before performing attacks on TCP / IP networks?
- 'Impersonation' must be achieved: To be able to perform unauthorized access to network resources (data).
- 'Replay of messages' must be done: To be able to access / receive information and change it, when the information is moving on the road.
- Must guess the key (Guessing of key): To be able to access the password and encrypted data (called "rough" attack: brute-force attack).
- All answers are correct
-
- Question 10. What is the type of denial of service attack:
- DoS
- DDoS
- Both types above
-
4 ★ | 1 Vote
You should read it
- Multiple choice questions on network security deployment have the answer P6
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
May be interested
Set of multiple choice questions for programming with P15 prize
Set of multiple choice questions on programming with P16 prize
Set of multiple choice questions about programming with P17 prize
You have confidence in your knowledge of Network Administration P5
Multiple choice questions about Photoshop P14
Test Microsoft Excel P16