1.
What are some of the security tools and applications used in securing a network? (Choose all that apply)
Correct Answer(s)
A. Updates and Patches
B. Firewalls
E. Anti-Virus
Explanation
Updates and Patches, Firewalls, and Anti-Virus are security tools and applications used in securing a network. Updates and Patches help to fix vulnerabilities and bugs in the network's software, ensuring that it is up to date and protected against potential threats. Firewalls act as a barrier between the network and external threats, monitoring and controlling incoming and outgoing network traffic. Anti-Virus software scans and detects malicious software, such as viruses and malware, and removes them from the network, preventing potential damage. These tools work together to enhance the security of a network and protect it from various cyber threats.
2.
Ryan sent 1000's and 1000's of pings to a web server in order to slow it down. What type of attack is he implementing?
Correct Answer
C. DoS
Explanation
Ryan is implementing a DoS (Denial of Service) attack by sending a large number of pings to the web server. This overwhelms the server's resources and causes it to slow down or crash, making it inaccessible to other users. This type of attack aims to disrupt the normal functioning of a system or network by flooding it with excessive traffic.
3.
Where was Ryan when he was making his attack?
Correct Answer
E. A or B
Explanation
The correct answer is A or B. This suggests that Ryan could have been either inside or outside the building when he was making his attack. The information provided does not specify his exact location, so both options are possible. It is unclear whether Las Vegas is relevant to the question, as it is not mentioned in the answer choices.
4.
What is a program that gathers personal information from your computer without your permission or knowledge?
Correct Answer
D. Spyware
Explanation
Spyware is a program that secretly collects personal information from a computer without the user's consent or knowledge. It is designed to monitor a user's online activities, gather sensitive data such as passwords, credit card information, and browsing habits, and transmit this information to third parties. Spyware can be installed through malicious downloads, email attachments, or by exploiting vulnerabilities in software. It poses a significant threat to privacy and can lead to identity theft, financial loss, and other cybercrimes.
5.
What are two types of advertising windows that can display when visting a web page? (Choose all that apply)
Correct Answer(s)
C. Popup
E. Pop-under
Explanation
Popup and pop-under are two types of advertising windows that can display when visiting a web page. Popup windows appear in front of the current browser window, overlaying the content, while pop-under windows open behind the current browser window and are only visible when the current window is closed or minimized. Spam, spyware, and adware are not types of advertising windows, but rather refer to unwanted or malicious software.
6.
What are some of the signs that a virus, worm, or trojan horse maybe present in your system? (Choose all that apply)
Correct Answer(s)
A. Unwanted Reboot
B. CPU usage very high
C. Active NIC light when sitting idle
E. Active hard drive light when sitting idle
Explanation
The signs that a virus, worm, or trojan horse may be present in your system include unwanted reboots, high CPU usage, active NIC light when sitting idle, and active hard drive light when sitting idle. These signs indicate that there may be malicious activity running in the background, causing the system to behave unusually. Unwanted reboots can be a result of malware trying to gain control of the system. High CPU usage can indicate the presence of a resource-intensive malicious program. The active NIC light and active hard drive light when sitting idle suggest that data is being transmitted or accessed without user intervention, indicating potential malware activity.
7.
Darcy is trying to get information over the telephone by pretending to be someone he is not. What kind of attack is Darcy using?
Correct Answer
C. Pretexting
Explanation
Darcy is using pretexting as an attack. Pretexting is a form of social engineering where an attacker creates a false identity or scenario to deceive someone into providing sensitive information. In this case, Darcy is pretending to be someone else over the telephone to obtain information. This tactic is commonly used to gain access to personal or financial information from unsuspecting individuals.
8.
What are some of the features that can be included in anti-virus programs? (Choose all that apply)
Correct Answer(s)
B. Resident Dynamic Scanning
C. E-mail Checking
E. Scheduled Scans
Explanation
Anti-virus programs are designed to protect computers from various threats. Resident Dynamic Scanning is a feature that continuously scans the system in real-time to detect and remove any viruses or malware. E-mail Checking is another important feature that scans incoming and outgoing emails for any malicious attachments or links. Scheduled Scans allow users to set up automatic scans at specific times to ensure regular system checks for viruses. Therefore, the correct answer includes these features as they are essential components of anti-virus programs.
9.
What is the website network administrators should report new instances of malware threats?
Correct Answer
D. Https://forms.us-cert.gov/report
Explanation
Network administrators should report new instances of malware threats to the website https://forms.us-cert.gov/report.
10.
What does a DMZ do?
Correct Answer
B. Allows an outside network to connect to an inside network server
Explanation
A DMZ (Demilitarized Zone) is a network segment that separates an organization's internal network from an external network, typically the internet. It acts as a buffer zone between the internal network and the outside world, allowing controlled access to specific resources. In the context of the given options, a DMZ allows an outside network to connect to an inside network server. This means that external users or networks can access specific services or servers hosted within the organization's internal network, while still maintaining a level of security and isolation.