Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Networking » Page 24

Networking

Q: What was one reason the Slammer worm was successful against SQL Server database servers in early 2003?a. It gained access through a previously unknown vulnerability in SQL serverb. Many administrators had not installed new patches designed to block this attackc. It was a polymorphic worm that rapidly changed signaturesd. It was a stealth worm that was difficult to detect

Q: Which of the following is notorious for enabling cookie snarfing?a. SpyNet b. PeepNetc. Cookienetd. Both a and b e. a, b, and c

Q: With which attachment was the Resume virus associated?a. Explorer.exe b. Explorer.msi c. Explorer.docd. Explorer.com

Q: How was the Melissa virus transported?a. File sharing b. Floppy disk c. Buffer overflowd. E-mail

Q: In Red Hat Linux, what mode do you need to be in to run the fdisk/mbr utility which replaces the MBR?a. Safe b. Rescue c. Recoveryd. MBR

Q: Which of the following executable file extensions is found only on Windows-based systems?a. .mst b. .msi c. .mspd. .btme. All of the above

Q: Which of the following executable file extensions can be found on a Netware 6.x system?a. .pl b. .msi c. .wsfd. .bin

Q: Which file on a Windows-based system is run when a system is booted, and can be used to rename specific files at startup?a. win.ini b. autoexec.bat c. wininit.inid. winstart.bat

Q: Which of the following is an example of a Netware 6.x file that can be the target of a virus?a. autoexec.bat b. startup.ncf c. win.inid. Both a and b

Q: Which of the following is an example of a Red Hat Linux file that can be the target of a virus?a. autoexec.bat b. inittab c. startup.ncfd. win.ini

Q: Which of the following is an example of a Trojan horse on a Mac OS system?a. Simpsons AppleScript Virus b. AOL4FREE c. Backdoor.Eggheadd. Code Red

Q: The _____ targets systems running the SQL Server database on Windows-based workstations and servers.a. Digispid.B.Worm b. Linux.Millen.Worm c. Linux.Lion.Wormd. Code Red II Worm

Q: What process does the Linux.Millen.Worm use on the attacked operating system?a. Telnet b. FTP c. DNSd. SMTP

Q: How many days of the month does the Code Red worm replicate?a. 15 b. 19 c. 23d. 29

Q: Which of the following worms uses buffer overflows to do damage?a. Code Red b. Code Red II c. Linux.Millen.Wormd. Both a and be. a, b, and c

Q: A(n) _____ virus uses defenses to make itself hard to find and detect.a. polymorphic b. stealth c. companiond. heuristic

Q: A(n) _____ virus appears to run from a file other than the one to which it is actually appended. a. stealth c. polymorphic b. armored d. companion

Q: A(n) _____ virus changes each time it is replicated, making it more difficult to create a defense against it.a. armored b. multipartite c. polymorphicd. heuristic

Q: A _____ virus can infect systems through multiple means, particularly through boot or partition sectors and through executable files.a. boot sector b. multipartite c. macrod. file infector

Q: A _____ virusspreads to instruction set files typically used by word processors, spreadsheets, databases, and other programs.a. boot sector b. file infector c. macrod. multipartite

Q: A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls.a. partition sector b. file infector c. macrod. multipartite

Q: The _____ virus can only become destructive if the user executes an infected file on a Friday the thirteenth.a. Linux.Millen.Worm b. INIT 1984 c. W32.Pinfid. Code Red II

Q: _____ is designed so that it does not infect all of these file types at once, but only a limited number each time Windows Explorer runs.a. INIT 1984 b. Code Red c. Slammer wormd. W32.Pinfi

Q: What is another name for malicious software?a. malsoft b. malware c. scriptwared. scriptsoft

Q: In Red Hat Linux, what command do you need to use to create a boot disk?a. mkboot b. makebootdisk c. mkbootdiskd. makebtdsk

Q: What do you need to have for Red Hat Linux if a system file on the hard disk is corrupted?a. An ERD b. An ASR set c. A boot diskd. An MBR

Q: How many copies of the ASR set should you have for a server?a. 1 b. 2 c. 3d. 4

Q: Which of the following operating systems uses an emergency repair disk?a. Windows 2000 Server b. Windows 2000 Pro c. Windows XP Prod. Windows 2003 Servere. Both a and b

Q: Which of the following Microsoft operating systems uses driver signing?a. Windows XP b. Windows MEc. Windows 98d. Windows 95 e. Both a and c

Q: Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windows-based systems?a. AntiVir Personal Edition b. HandyBits VirusScan c. McAfee VirusScand. Sophos Anti-Virus

Q: Which anti-virus software is available for use on only Windows and Mac OS systems?a. Central Command Vexira AntiVirus b. F-Prot AV c. Norton AntiVirusd. McAfee VirusScane. Both c and d

Q: Which of the following virus programs is available for purchase on a Windows-based workstation?a. AntiVir Personal Edition b. Handybits Viruscan c. VCatch Basicd. Sophos Anti-viruse. Both b and d

Q: Mac OS and NetWare automatically display the boot load information to the screen each time one of these systems is booted. _________________________

Q: Software exploitation is particularly aimed at new software and new software versions. _________________________

Q: A(n) boot sector virus typically infects or replaces the instructions in the MBR or the Partition Boot Sector. _________________________

Q: Batch files and scripts are files that contain code or instructions that are run by a(n) interpreter. _________________________

Q: A(n) macro virus, worm, or Trojan horse is a file that contains lines of computer code that can be run. _________________________

Q: The Digispid.B.Worm targets systems running the SQL Server database on Windows-based workstations and servers. _________________________

Q: The Code Red worm replicates for the first 23 days of the month and then stops. _________________________

Q: A(n) stealth virus uses defenses to make itself hard to find and detect. _________________________

Q: File infector viruses can infect systems through multiple means, particularly through boot or partition sectors and through executable files. _________________________

Q: The first stage of virus spread that occurs is replication within the infected system. _________________________

Q: Organizational policy works best when users are included in the process, so that they know the importance of security.

Q: The Windows 2003 Server ASR set backs up all system files, system settings, and application data files.

Q: Windows 2000 Server allows you to create an ERD, which enables you to fix problems that may arise with the server, such as corrupted system files.

Q: The Netware 6.x operating system has a software update tool that connects to the Internet to obtain patches.

Q: Cookie snarfing is an attack where a spyware operator can reconstruct a user's every move on the Internet by capturing cookies or the information contained in the cookies.

Q: Boot or partition sector viruses particularly affect Windows and Netware systems.

Q: In Netware, the startup.ncf file contains commands used by the server.exe startup program.

Q: Backdoor.Egghead is an example of a worm that is spread by buffer overflows.

Q: A benign virus is one that replicates but does not inflict harm on a computer.

Q: The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems.

Q: List four mediums over which computer networks can transmit data.

Q: List three common password options that are offered in the BIOS.

Q: What are the five basic operating system components?

Q: What six basic tasks does an operating system perform?

Q: List four hardening techniques that can be used with networks.

Q: List five types of VPN security that can be provided by operating systems.

Q: List six features that operating systems provide for hardening a system.

Q: List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.

Q: Which three NLMs enable a workstation to remotely access the Netware system console?

Q: Match the following terms to the appropriate definitions.a. Attribute f. LSRRb. Buffer g. Macroc. Buffer overflow h. Source routingd. DoS attack i. Spoofinge. DDos attack j. Worm1/ Occurs when there is more data to store in a buffer than the buffer can hold2/ The address of the source computer is changed3/ A computer causes other computers to launch attacks directed at one or more targets4/ The sender of a packet specifies the precise path that a packet will take5/ A form of source routing that specifies only one portion of a route6/ A characteristic associated with a directory, folder, or file7/ Flooding a network with frames or packets containing errors8/ A program that replicates and replicates on the same computer9/ A storage area in a device that temporarily saves information in memory10/ A set of instructions for an activity that is performed frequently

Q: Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.

Q: A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.

Q: ____________________ is a TCP/IP protocol that provides terminal emulation services over a network or the Internet.

Q: One way to help reduce the _________________________ is to purchase systems that are designed to work together in an environment that enables easier and faster configuration.

Q: ____________________ security policies can often help to override politics that limit good security in an organization.

Q: In operating systems, the built-in ____________________ account is typically deactivated or has a password.

Q: A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.

Q: The ____________________ allows you to set a password that governs access to the hard disk drive.

Q: The ____________________ communicates with the BIOS, device drivers, and the API to perform operating system functions such as control of memory and storage.

Q: A(n) ____________________ is ideal for providing security because it takes care of the computer's most basic input/output functions.

Q: Is a virus hoax a virus?

Q: Does a locked computer operations room guarantee the protection of a network server?

Q: Is the cost of deploying security more expensive than the cost of not deploying security?

Q: Do users need training in the use of security tools to help limit human failure and neglect?

Q: Will a security policy help to overcome the human factors that diminish security in an organization?

Q: Should security or system patches be installed immediately upon their release?

Q: Do all networks have vulnerable points that require security?

Q: Do the operating system device drivers coordinate operating system functions such as control of memory and storage?

1 2 3 … 25 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved