Multiple choice questions about network security implementation have the answer P7
- Question 1. The technique of stealing accounts with Keylog is often used by newbie Hacker users because:
- Keylog is very powerful in identifying user / password in outbound packets
- Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
- Because most users are not interested in security issues and Anti Virus
- It is difficult to be detected by Anti Virus programs
-
- Question 2. To execute a Trojan-Backdoor attack. Hackers will do it
- The Trojan Server is installed on the victim's computer - Hacker controls with the Trojan Client
- The hacker uses a Trojan Client to attack the victim's computer via ports received from Scanning technology
- Hackers use a Trojan Server, attack the victim's machine through the ports received from Scanning technology
- The Trojan Client is installed on a victim's computer - Hacker is controlled by a Trojan Server
-
- Question 3. How do computer worms and other viruses spread?
- Automatically spread and infect between systems
- Spread through attachments with email
- It is almost impossible to spread unless you open or run an infected program
- Spread through email content
-
- Question 4. Is the information system divided into several main parts?
- first
- 2
- 3
-
- Question 5. In 1992 and revised in 2002, OECD's guidance on security for information and network systems has exported many basic principles:
- 8
- 9
- ten
-
- Question 6. In 2004, how many basic principles did the NIST organization propose?
- 32
- 33
- 34
-
- Question 7. RFID - What is Radio Frequency Identification?
- Biometric identification
- Identify via RF signals with the information to be determined
- Image recognition
- Not the above forms
-
- Question 8. How many basic elements of information does the CIA triangle model have?
- 6
- 7
- 8
- 9
-
- Question 9. What are the targets that hackers target before performing attacks on TCP / IP networks?
- 'Impersonation' must be achieved: To be able to perform unauthorized access to network resources (data).
- 'Replay of messages' must be done: To be able to access / receive information and change it, when the information is moving on the road.
- Must guess the key (Guessing of key): To be able to access the password and encrypted data (called "rough" attack: brute-force attack).
- All answers are correct
-
- Question 10. What is the type of denial of service attack:
- DoS
- DDoS
- Both types above
-
4 ★ | 1 Vote
You should read it
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
May be interested
- How to create multiple choice questions on VnEduvnedu education network provides a lot of utilities for users, outstanding among them is to allow teachers to set up exam questions structure containing different multiple choice questions. if you just use vnedu, surely many teachers still face many difficulties, so below we will guide the detailed steps to create a multiple choice exam on vnedu.
- Set of multiple choice questions on programming with P3 prizeinvite readers to participate in testing knowledge with questions around the topic of the following programming of network administrator. the question set will have 10 questions with 4 answers, please choose the most accurate answer.
- Test on database security P4today network administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.
- Multiple choice questions about Javascript languageif you are a beginner of these programming languages, the following multiple-choice questions of network administrator will be very suitable for you to support knowledge.
- Multiple choice questions about network security deployment have answerswith these useful network security tests, you will reinforce your knowledge.
- Test of PowerPoint computing - Part 3a set of multiple choice questions about powerpoint, please refer to the network administrator.
- Test about LANin this article, join the network administrator to answer multiple choice questions related to lan.
- eQuiz - Multiple choice test about Networking Basicwelcome to the test series of tipsmake.com with topics related to the fields of information technology. and this time we will continue with the test of networking basic, there will be 13 questions in total with no time for answering each sentence. there will be some questions with many different answer options.
- A set of JavaScript multiple-choice questions with P2 answerslocated in the series of tests on programming languages, in the basic knowledge test below network administrators will send you questions with javascript topics.
- Set of multiple choice questions on award winning P4 programmingthe set of multiple choice questions for programming has been invited to read and test by the network administrator. set of 10-question questions with 4 answers, try to see how many answers you can get.