A) A Phishing Attack
B) A Questioning Attack
C) A Cloaking Attack
D) A Exploit Attack
Correct Answer
verified
Multiple Choice
A) Worms spread via e-mail, while Trojan horses don't.
B) Worms are a form of malicious code, whereas Trojan horses are not.
C) They are the same.
D) Worms self replicate, while Trojan horses don't.
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Spam
D) Vishing
Correct Answer
verified
Multiple Choice
A) TCP/IP Hijacking
B) UDP Attack
C) ICMP Attacks
D) Smurf Attacks
Correct Answer
verified
Multiple Choice
A) The firewall's logs
B) Audit logs of the user who has attacked
C) Domain controller's logs
D) Audit logs of the user who has been attacked
Correct Answer
verified
Multiple Choice
A) Spoofing
B) DDoS
C) Replay
D) Man-in-the-Middle
Correct Answer
verified
Multiple Choice
A) TCP/IP hijacking
B) Password guessing attack
C) Man-in-the-middle attack
D) Worm attack
Correct Answer
verified
Multiple Choice
A) TCP ACK attack
B) TCP/IP hijacking
C) Smurf attack
D) Virus attack
Correct Answer
verified
Multiple Choice
A) SQL Injection
B) LDAP Injection
C) XML Injection
D) Cross-site Scripting
Correct Answer
verified
Multiple Choice
A) TCP
B) IP
C) UDP
D) ICMP
Correct Answer
verified
Multiple Choice
A) Firewall
B) Performance monitor
C) Network scanner
D) Protocol analyzer
Correct Answer
verified
Multiple Choice
A) ACK attack
B) Worm
C) Logic bomb
D) Virus
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Buffer Overflow
C) Spam
D) Back door entry
Correct Answer
verified
Multiple Choice
A) Hardware
B) Security
C) Access
D) System
Correct Answer
verified
Multiple Choice
A) Man-in-the-middle attack
B) Back door attack
C) Replay attack
D) TCP/IP hijacking
Correct Answer
verified
Multiple Choice
A) Multi factor authentication
B) Token authentication
C) Smart card authentication
D) No removable-media drives or ports on the computers policy
Correct Answer
verified
Showing 21 - 36 of 36
Related Exams