Prelim Exam MIT

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following can distribute itself without using a host file?
2.
1 point
The system administrator of the company has resigned. When the administrator's user ID is deleted, the system suddenly begins deleting files. What type of malicious code is this?
3.
1 point
Which of the following provides the strongest form of authentication?
4.
1 point
Which type of attack can easily break a user's password if the user uses simple and meaningful things such as pet names or birthdays for their passwords?
5.
1 point
Which types of attachments should be filtered from e-mails to minimize the danger of viruses?
6.
1 point
With regard to viruses and hoaxes, which of the following is TRUE? (Choose the best answer)
7.
1 point
What type set to go off following a preset time interval, the program can record system keystrokes in a text file and e-mail it to the author, and will also delete system logs every five days or whenever a backup is performed?
8.
1 point
Which of the following is the best defense against man in the middle attacks?
9.
1 point
Which of the following network mapping tools uses ICMP (Internet Control Message Protocol)?
10.
1 point
Which of the following is most common method of accomplishing DDoS (Distributed Denial of Service) attacks?
11.
1 point
In which of the following does someone use an application to capture and manipulate packets as they are passing through your network?
12.
1 point
What is a piece of malicious code that has no productive purpose but can replicate itself and exist only to damage computer systems or create further vulnerabilities called?
13.
1 point
Which of the following occurs when a string of data is sent to a buffer that is larger than the buffer was designed to handle?
14.
1 point
Which of the following provides a WLAN (Wireless Local Area Network) with the level of security associated with a LAN (Local Area Network)?
15.
1 point
How many ports in TCP/IP (Transmission Control Protocol/Internet Protocol) are vulnerable to being scanned, exploited, or attached?
16.
1 point
Which of the following determines which operating system is installed on a system by analyzing its response to certain network traffic?
17.
1 point
You work as the security administrator at wwwspcf.com. You want to configure the SPCF network to allow only HTTP (Hypertext Transfer Protocol) traffic for outbound Internet connections. You also want to set permissions to allow only certain users to browse the web. Which of the following should you use?
18.
1 point
Which of the following represents the best method for securing a web browser?
19.
1 point
On a firewall, which ports must be open in order to allow FTP (File Transfer Protocol) traffic?
20.
1 point
Which of the following attacks uses ICMP (Internet Control Message Protocol) and improperly formatted MTUs (Maximum Transmission Unit) to crash a target computer?
21.
1 point
What should the minimum length of a password be to deter dictionary password cracks?
22.
1 point
Which of the following is the major difference between a worm and a Trojan horse?
23.
1 point
Which of the following is the most important step that should be taken in response to a security breach?
24.
1 point
What would a user's best plan of action be on receiving an e-mail message warning of a virus that may have accidentally been sent in the past, and suggesting that the user to delete a specific file if it appears on the user's computer?
25.
1 point
You work as a security administrator at www.spcf.edu.ph. On examining the server's list of protocols that are bound and active on each network interface card, you notice a relatively large number of protocols. What should you do to ensure network security?
26.
1 point
You are the security administrator at HAU. You detect intruders accessing your internal network. The source IP (Internet Protocol) addresses originate from trusted networks. What type of attack are you experiencing?
27.
1 point
What is the process of forging an IP (Internet Protocol) address to impersonate another machine called?
28.
1 point
Malicious port scanning determines the
29.
1 point
Which of the following ports does a DNS (Domain Name Service) server require?
30.
1 point
Which of the following attacks exploits the session initiation between the Transport Control Program (TCP) client and server in a network?
31.
1 point
Which of the following attacks attempts to crack passwords?
32.
1 point
Which of the following is the most costly method of an authentication?
33.
1 point
Which of the following can be used to track a user's browsing habits on the Internet?
34.
1 point
What is the first step in implementing a firewall?
35.
1 point
Which of the following can be deterred against by increasing the keyspace and complexity of a password?
36.
1 point
What do intruders use most often to gain unauthorized-access to a system? A process where an attacker attempts to acquire information about your network and system by talking to people in the organization.
37.
1 point
Which of the following is an effective method of preventing computer viruses from spreading?
38.
1 point
Which of the attacks can involve the misdirection of the domain name resolution and Internet traffic?
39.
1 point
What is an application that appears to perform a useful function but instead contains some sort of malicious code called?
40.
1 point
Which of the following provides the best protection against an intercepted password?