Cyber Security part 5
81. Software that is harmful or destructive, such as viruses and worms.
A. Spam
B. Malware
C. Worms
D. Trojan Horses
82. Infectious malware spreading without user interaction.
A. Virus
B. Trojan Horses
C. Spam
D. Worms
83. A program advertised as performing one activity, but that actually does something else.
A. Trojan Horses
B. Spam
C. Worms
D. Virus
84. Unwanted e-mail that usually consists of commercial advertising sent in bulk.
A. E-mail Bomb
B. Macros
C. Spam
D. Trojan Horses
85. Large quantity of bulk e-mail that overwhelms an e-mail server preventing user access.
A. Macros
B. Trojan Horses
C. E-mail Bomb
D. Spam
86. What is the attack called in which the aggressor possesses the user's legitimate DNS server?
A. Web Spoofing
B. Man in the middle
C. DNS spoofing
D. ARP poisoning
87. What technique is used so that a file is encoded so that only the intended recipient may read the original contents?
A. Encryption
B. Password
C. Algorithm
D. Key
88. What allows you to pass reserved IP addresses through a public network that otherwise would not accept them?
A. Authentication
B. Tunneling
C. VPN
D. Cipher
89. The studies security issues and provides publications and alerts to help educate the public to threats facing information.
A. IETF
B. CERT/CC
C. ISOC
D. EISG
90. Packet sniffing can be used to obtain username and password information in clear text from which of the following?
A. FTP (File Transfer Protocol)
B. SSH (Secure Shell)
C. SSL (Secure Sockets Layer)
D. HTTPS (Hypertext Protocol over Secure Sockets Layer)
91. A(n) is a client computer that is connected to the Internet and hosts firewall software.
A. Screening router
B. Dual-homed host
C. Multi-firewall DMZ
D. DMZ screened subnet
92. The server in the DMZ needs only list a number of public IP addresses
A. Proxy
B. NAT
C. DNS
D. Firewall
93. A(n) router filters traffic to individual computers within the internal network.
A. Screening
B. PIX
C. Blocking
D. Reverse\
94.
Cyber Security Answer Sheet
81. B
82. D
83. A
84. C
85. C
A. Spam
B. Malware
C. Worms
D. Trojan Horses
82. Infectious malware spreading without user interaction.
A. Virus
B. Trojan Horses
C. Spam
D. Worms
83. A program advertised as performing one activity, but that actually does something else.
A. Trojan Horses
B. Spam
C. Worms
D. Virus
84. Unwanted e-mail that usually consists of commercial advertising sent in bulk.
A. E-mail Bomb
B. Macros
C. Spam
D. Trojan Horses
85. Large quantity of bulk e-mail that overwhelms an e-mail server preventing user access.
A. Macros
B. Trojan Horses
C. E-mail Bomb
D. Spam
86. What is the attack called in which the aggressor possesses the user's legitimate DNS server?
A. Web Spoofing
B. Man in the middle
C. DNS spoofing
D. ARP poisoning
87. What technique is used so that a file is encoded so that only the intended recipient may read the original contents?
A. Encryption
B. Password
C. Algorithm
D. Key
88. What allows you to pass reserved IP addresses through a public network that otherwise would not accept them?
A. Authentication
B. Tunneling
C. VPN
D. Cipher
89. The studies security issues and provides publications and alerts to help educate the public to threats facing information.
A. IETF
B. CERT/CC
C. ISOC
D. EISG
90. Packet sniffing can be used to obtain username and password information in clear text from which of the following?
A. FTP (File Transfer Protocol)
B. SSH (Secure Shell)
C. SSL (Secure Sockets Layer)
D. HTTPS (Hypertext Protocol over Secure Sockets Layer)
91. A(n) is a client computer that is connected to the Internet and hosts firewall software.
A. Screening router
B. Dual-homed host
C. Multi-firewall DMZ
D. DMZ screened subnet
92. The server in the DMZ needs only list a number of public IP addresses
A. Proxy
B. NAT
C. DNS
D. Firewall
93. A(n) router filters traffic to individual computers within the internal network.
A. Screening
B. PIX
C. Blocking
D. Reverse\
94.
Cyber Security Answer Sheet
81. B
82. D
83. A
84. C
85. C