Security
Security, sample question
1. A ______ activity is the way that hackers contact our phone or emails and attempt to acquire our username and password.
A. Spoffing
B. Pishing
C. Spamming
D. Snooping
2. Which attack takes advantage of a trusted relationship that exist between two system?
A. Password guessing
B. Sniffing
C. Brute-force
D. Spoffing
3. Identify how bugs and errors in software can be a source of technology weakness?
A. Bugs and errors can lead to loop holes which hackers can use to attack a system.
B. Bugs and errors can lead to patches and updates being done.
C. Bugs and errors can lead more bug and errors in the software.
D. Bugs and errors are good for the network.
4. “It is used for finding problems in the network and to determine the amount of traffic on the networks as a performance measurement.” (Wikipedia)
Which of the following tools can be used for the above proble?
A. Netstat tool
B. NetScan
C. SuperScan
D. hping tool
5. ______ involves a process of tightening down or increasing the security of an individual host.
A. Device Hardening
B. Server Management
C. Network Security
D. Hardware Hardening
1. A ______ activity is the way that hackers contact our phone or emails and attempt to acquire our username and password.
A. Spoffing
B. Pishing
C. Spamming
D. Snooping
2. Which attack takes advantage of a trusted relationship that exist between two system?
A. Password guessing
B. Sniffing
C. Brute-force
D. Spoffing
3. Identify how bugs and errors in software can be a source of technology weakness?
A. Bugs and errors can lead to loop holes which hackers can use to attack a system.
B. Bugs and errors can lead to patches and updates being done.
C. Bugs and errors can lead more bug and errors in the software.
D. Bugs and errors are good for the network.
4. “It is used for finding problems in the network and to determine the amount of traffic on the networks as a performance measurement.” (Wikipedia)
Which of the following tools can be used for the above proble?
A. Netstat tool
B. NetScan
C. SuperScan
D. hping tool
5. ______ involves a process of tightening down or increasing the security of an individual host.
A. Device Hardening
B. Server Management
C. Network Security
D. Hardware Hardening
Security
Reviewed by FJ
on
2:13 AM
Rating:




No comments