Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Security+ Chapter 2 Quizzes and answers

Beoordeling
-
Verkocht
-
Pagina's
3
Cijfer
A+
Geüpload op
06-08-2022
Geschreven in
2022/2023

A group of compromised computers that have software installed by a worm or Trojan is known as what? Botnet Which of the following computer security threats can be updated automatically and remotely? Virus Worm Zombie Malware Zombie 00:12 01:26 You have been given the task of scanning for viruses on a PC. What is the best of the following methods? Recovery environment Dual-boot into Linux Command Prompt only Boot into Windows normally Recovery environment Which of the following is a common symptom of spyware? Infected files Computer shuts down Applications freeze Pop-up windows Pop-up windows Stan the man is a network administrator. One day he notices that his DHCP server is flooded with information. he analyzes it and finds that the information is coming from more than 50 computers on the network. Which of the following is the most likely reason? Virus Worm Zombie PHP script Worm Which of the following is not an example of malicious software? Rootkits Spyware Viruses Browser Browser What type of attack uses more than one computer? DDoS What is a malicious attack that executes at the same time every week? Logic bomb Which of these is a true statement concerning active interception? When a computer is put between a sender and a receiver When a person overhears a conversation When a person looks through files When a person hardens an operating system When a computer is put between a sender and a receiver Which of the following types of scanners can locate a rootkit on a computer? Image scanner Barcode scanner Malware scanner Adware scanner Malware scanner Which type of malware doesn't require a user to execute a program to distribute the software? Worm Whitelisting, blacklisting, and closing open relays are all mitigation techniques addressing what kind of threat? Spam How do most network-based viruses spread? Through e-mail Which of the following defines the difference between a Trojan horse and a worm? Worms self-replicate but Trojan horses do not The two are the same Worms are sent via e-mail; Trojan horses are not Trojan horses are malicious attacks; worms are not Worms self-replicate but Trojan horses do not What virus hides its code to mask itself? Armored virus What type of malware appears to the user as legitimate but actually enables unauthorized access to the user's computer? Trojan Which of the following would be considered detrimental effects of a virus hoax? (Select the two best answers) Technical support resources are consumed by increased user calls Users are at risk for identity theft Users are tricked into changing the system configuration The e-mail server capacity is consumed by message traffic Technical support resources are consumed by increased user calls, users are tricked into changing the system configuration One of your co-workers complains of very slow system performance and says that a lot of antivirus messages are being displayed. The user admits to recently installing pirated software and downloading and installing an illegal keygen to activate the software. What type of malware has affected the user's computer? Trojan A user complains that they were browsing the Internet when the computer started acting erratically and crashed. you reboot the computer and notice that performance is very slow. In addition, after running a netstat command you notice literally hundreds of outbound connections to various websites, many which are well-known sites. Which of the following happened? The computer is infected with spyware The computer is infected with a virus The computer is now part of a botnet The computer is now infected with a rootkit The computer is now part of a botnet Stan the man was not being careful when browsing the Internet. He was redirected to a warez site where a number of pop-ups appeared. After clicking one pop-up by accident, a drive-by download of unwanted software occurred. What does the download most likely contain? Spyware You are the network administrator for a small organization without much in the way of security policies. While analyzing your servers' performance you find various chain messages that have been received by the company. Which type of security control should you implement to fix the problem? Anti-spam

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Security+ Chapter 2 Quiz
A group of compromised computers that have software installed by a worm or Trojan is
known as what? - Answer Botnet

Which of the following computer security threats can be updated automatically and
remotely?
Virus
Worm
Zombie
Malware - Answer Zombie

You have been given the task of scanning for viruses on a PC. What is the best of the
following methods?
Recovery environment
Dual-boot into Linux
Command Prompt only
Boot into Windows normally - Answer Recovery environment

Which of the following is a common symptom of spyware?
Infected files
Computer shuts down
Applications freeze
Pop-up windows - Answer Pop-up windows

Stan the man is a network administrator. One day he notices that his DHCP server is
flooded with information. he analyzes it and finds that the information is coming from
more than 50 computers on the network. Which of the following is the most likely
reason?
Virus
Worm
Zombie
PHP script - Answer Worm

Which of the following is not an example of malicious software?
Rootkits
Spyware
Viruses
Browser - Answer Browser

What type of attack uses more than one computer? - Answer DDoS

What is a malicious attack that executes at the same time every week? - Answer Logic
bomb

Geschreven voor

Vak

Documentinformatie

Geüpload op
6 augustus 2022
Aantal pagina's
3
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5205
Lid sinds
4 jaar
Aantal volgers
3567
Documenten
55668
Laatst verkocht
18 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 beoordelingen

5
451
4
167
3
171
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen