- Keylog is very powerful in identifying user / password in outbound packets
- Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
- Because most users are not interested in security issues and Anti Virus
- It is difficult to be detected by Anti Virus programs
Multiple choice questions about network security implementation have the answer P7
- Question 1. The technique of stealing accounts with Keylog is often used by newbie Hacker users because:
- Question 2. To execute a Trojan-Backdoor attack. Hackers will do it
- The Trojan Server is installed on the victim's computer - Hacker controls with the Trojan Client
- The hacker uses a Trojan Client to attack the victim's computer via ports received from Scanning technology
- Hackers use a Trojan Server, attack the victim's machine through the ports received from Scanning technology
- The Trojan Client is installed on a victim's computer - Hacker is controlled by a Trojan Server
-
- Question 3. How do computer worms and other viruses spread?
- Automatically spread and infect between systems
- Spread through attachments with email
- It is almost impossible to spread unless you open or run an infected program
- Spread through email content
-
- Question 4. Is the information system divided into several main parts?
- first
- 2
- 3
-
- Question 5. In 1992 and revised in 2002, OECD's guidance on security for information and network systems has exported many basic principles:
- 8
- 9
- ten
-
- Question 6. In 2004, how many basic principles did the NIST organization propose?
- 32
- 33
- 34
-
- Question 7. RFID - What is Radio Frequency Identification?
- Biometric identification
- Identify via RF signals with the information to be determined
- Image recognition
- Not the above forms
-
- Question 8. How many basic elements of information does the CIA triangle model have?
- 6
- 7
- 8
- 9
-
- Question 9. What are the targets that hackers target before performing attacks on TCP / IP networks?
- 'Impersonation' must be achieved: To be able to perform unauthorized access to network resources (data).
- 'Replay of messages' must be done: To be able to access / receive information and change it, when the information is moving on the road.
- Must guess the key (Guessing of key): To be able to access the password and encrypted data (called "rough" attack: brute-force attack).
- All answers are correct
-
- Question 10. What is the type of denial of service attack:
- DoS
- DDoS
- Both types above
-
Update 24 May 2019
Network safetytestinggood questionsinformation securitynetwork administrationhow to ensure network safety
You should read it
- Multiple choice questions on network security deployment have the answer P6
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
Maybe you are interested
What is Xbox Game Pass? Xbox Game Pass Vietnam Microsoft will add a cloud-based Xbox Game Pass option How to use Xbox Game Pass for free 6 reasons why users stick with Xbox Game Pass 5 disadvantages of Xbox Game Pass to keep in mind Among Us will support Xbox in 2021, coming with a new map of Airship