1.
Which of the following is most likely to send spam emails from your computer?
Correct Answer
B. Worm
Explanation
A worm is most likely to send spam emails from your computer. Unlike viruses and Trojans, worms are capable of spreading themselves without any user interaction. They can replicate and spread across networks, infecting multiple computers and using them to send out spam emails. Worms often exploit vulnerabilities in operating systems or software to gain unauthorized access to computers and use them for malicious activities, such as sending spam. Therefore, a worm is the most likely culprit for sending spam emails from your computer.
2.
Which
of the following is most likely to steal your identity?
Correct Answer
D. Spyware
Explanation
Spyware is most likely to steal your identity because it is designed to gather personal information without the user's knowledge or consent. It can track your online activities, capture sensitive data such as passwords and credit card information, and send it to a third party. Unlike viruses or worms, which are mainly focused on causing damage to your computer, spyware specifically targets your personal information for malicious purposes.
3.
Which
of the following is less likely to be detected with standard antivirus
software?
Correct Answer
E. Adware
Explanation
Adware is less likely to be detected with standard antivirus software because it is a type of software that displays unwanted advertisements on a user's device. Unlike viruses, worms, trojans, spyware, which are malicious and harmful, adware is often considered a low-level threat. It is designed to generate revenue for the creators by displaying ads, and it may not always exhibit the same characteristics as traditional malware. Standard antivirus software may not prioritize detecting or removing adware since it is not directly harmful to the user's device or data.
4.
DoS
attacks cannot be launched against routers.
Correct Answer
B. False
Explanation
DoS (Denial of Service) attacks can indeed be launched against routers. A DoS attack aims to overwhelm a target device or network with a flood of illegitimate requests or traffic, causing it to become unresponsive or crash. Routers, being a critical component of a network infrastructure, are often targeted by hackers to disrupt network connectivity or gain unauthorized access. Different types of DoS attacks, such as TCP/IP attacks, SYN floods, or ICMP floods, can be directed towards routers, exploiting vulnerabilities in their software or overwhelming their processing capabilities. Therefore, the statement that DoS attacks cannot be launched against routers is false.
5.
Auditing
is used to secure the network and systems on your network.
Correct Answer
B. False
Explanation
Auditing is not used to secure the network and systems on your network. Auditing is a process of examining and analyzing various aspects of a network or system to ensure compliance with established policies and procedures. It involves reviewing logs, records, and other data to identify any vulnerabilities or potential security risks. While auditing can help identify security issues, it is not the primary method for securing the network and systems. Other security measures such as firewalls, encryption, access controls, and regular patching are typically used to secure the network and systems.
6.
This is a series of messages sent by someone
attempting to break into a computer to learn which network services
the computer provides.
Correct Answer
C. Port scan
Explanation
A port scan is a technique used by hackers to identify open ports on a computer or network. By sending messages to various ports, the hacker can determine which network services are running on the target computer. This information is valuable for planning further attacks or exploiting vulnerabilities in the system.
7.
Which of the following network operating system logon
restrictions is most likely to stop a hacker who is attempting to discover
someone's password through a brute force or dictionary attack?
Correct Answer
D. Number of unsuccessful logon attempts
Explanation
The number of unsuccessful logon attempts is the most likely restriction to stop a hacker attempting to discover someone's password through brute force or dictionary attack. This restriction would limit the number of attempts a hacker can make before being locked out, making it difficult for them to guess the correct password.
8.
Deliberate
software attacks are referred to as:
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because deliberate software attacks can be categorized as malware, malicious code, or malicious software. Malware refers to any software designed to harm a computer system, while malicious code specifically refers to harmful instructions or scripts within software. Malicious software encompasses any software created with malicious intent, including both malware and malicious code. Therefore, all three terms are appropriate descriptions for deliberate software attacks.
9.
What
IDS identifies intrusions based on a preset database that identifies known
attack signatures?
Correct Answer
C. Knowledge Based IDS
Explanation
A Knowledge Based IDS identifies intrusions based on a preset database that contains known attack signatures. This means that the IDS is programmed with specific patterns or characteristics of known attacks, and it compares incoming network traffic or system activity against these patterns. If a match is found, the IDS triggers an alert or takes appropriate action to mitigate the intrusion. This type of IDS relies on a database of knowledge about known attacks, making it effective in detecting and preventing known threats.
10.
What port does secure HTTP use?
Correct Answer
C. 443
Explanation
Secure HTTP, also known as HTTPS, uses port 443. This port is specifically designated for secure web communications using the SSL/TLS protocols. By using port 443, HTTPS ensures that the data exchanged between the client and the server is encrypted and secure from unauthorized access. Port 443 is widely used for secure online transactions, banking, and any other activities that require a secure connection over the internet.
11.
DoS is a
Correct Answer
B. Denial of service attack
Explanation
A denial of service attack (DoS) is a type of cyber attack where an attacker overwhelms a system or network with a flood of illegitimate requests, causing it to become unavailable to its intended users. This can be done by exploiting vulnerabilities in the system, such as consuming all available resources or crashing the system. A DoS attack aims to disrupt the normal functioning of a service or website, making it inaccessible to legitimate users.
12.
Security
updates are needed to:
Correct Answer
A. Improve flaws in installed programs and operating systems to resolve vulnerabilities
Explanation
Security updates are necessary to improve flaws in installed programs and operating systems in order to resolve vulnerabilities. These updates aim to address any weaknesses or loopholes that may exist in the software, making it less prone to attacks or unauthorized access. By identifying and patching these flaws, the updates enhance the overall security of the system, protecting it from potential threats and ensuring the safety of user data.
13.
What is the main problem of a modern antivirus?
Correct Answer
C. Dependence on antivirus signatures
Explanation
The main problem of a modern antivirus is its dependence on antivirus signatures. Antivirus programs rely on signatures to identify known malware and viruses. However, this approach is not effective against new and unknown threats. As cybercriminals constantly create new malware variants, antivirus programs may not be able to detect them without an updated signature database. This limitation makes antivirus programs less reliable in protecting against emerging threats and requires constant updates to stay effective.
14.
Which
of the following commands typed in the “RUN” menu in Windows will NOT help you
find out and configure which programs are allowed to be auto-started on a
system?
Correct Answer
B. “IPconfig/all”
Explanation
The command "IPconfig/all" is used to display the IP configuration settings for all network interfaces on a Windows system. It does not provide any information or configuration options related to auto-started programs.
15.
What is a hash?
Correct Answer
A. An encrypted value
Explanation
A hash is a type of encryption that converts data into a fixed-size string of characters. It is used to securely store and transmit sensitive information such as passwords. The encrypted value produced by a hash function is irreversible, meaning it cannot be decrypted to obtain the original data. Therefore, it provides a high level of security and is commonly used in various applications to protect data integrity and ensure authentication.
16.
What
does SSL stand for?
Correct Answer
C. Secure Sockets Layer
Explanation
SSL stands for Secure Sockets Layer. This is a cryptographic protocol that provides secure communication over a network. It ensures that the data transmitted between a web server and a browser remains encrypted and protected from unauthorized access. SSL is commonly used to secure online transactions, such as credit card payments, login credentials, and sensitive information exchange. By encrypting the data, SSL helps to prevent eavesdropping, data tampering, and identity theft.
17.
A (n) ________ is a computer system on the Internet
that is expressly set up to attract and "trap" people who attempt to penetrate
other people's computer systems.
Correct Answer
C. Honeypot
Explanation
A honeypot is a computer system that is intentionally designed to attract and deceive hackers or unauthorized users attempting to gain access to other computer systems. It acts as a trap, luring these individuals into interacting with the system while monitoring their activities. The purpose of a honeypot is to gather information about potential threats, study attack techniques, and enhance the security of real systems by diverting malicious activity away from them.
18.
I
use a Mac therefore I’m not exposed to security threats.
Correct Answer
B. False
Explanation
This statement is false because using a Mac does not guarantee immunity from security threats. While Macs are generally considered to be more secure than Windows PCs due to their smaller market share and built-in security features, they are still vulnerable to malware, phishing attacks, and other security risks. No computer system is completely immune to security threats, and it is important for Mac users to take appropriate precautions such as using strong passwords, keeping software up to date, and using antivirus software.
19.
__________ is a method used by firewalls to filter and
block unauthorized traffic.
Correct Answer
B. Stateful/Packet Inspection
Explanation
Stateful/Packet Inspection is a method used by firewalls to filter and block unauthorized traffic. This technique examines the entire network communication session, rather than just individual packets, to determine if the traffic is authorized or not. It keeps track of the state of the connection and uses this information to make decisions about allowing or blocking traffic. This method provides a higher level of security and is more effective in detecting and preventing unauthorized access to a network.
20.
A hardware firewall is just a (n) ________ running on a
dedicated piece of hardware or specialized device.
Correct Answer
A. Software Firewall
Explanation
A hardware firewall is a type of firewall that is implemented using dedicated hardware or specialized devices. In contrast, a software firewall is a firewall that is implemented using software running on a computer or server. Therefore, the correct answer is "Software Firewall" as it refers to a firewall that is running on a dedicated piece of hardware or specialized device.
21.
A system that monitors traffic into and out of a
network and automatically alerts you when suspicious traffic patterns occur,
indicating a possible unauthorized intrusion attempt is called a(n)
Correct Answer
A. IDS
Explanation
An IDS, or Intrusion Detection System, is a system that monitors network traffic and alerts the user when suspicious traffic patterns are detected. This can indicate a possible unauthorized intrusion attempt. Unlike a firewall or router, which primarily focus on blocking or allowing traffic based on predetermined rules, an IDS is specifically designed to detect and notify about potential intrusions. Antivirus software, on the other hand, is primarily used to detect and remove malware from a system, rather than monitoring network traffic. Therefore, the correct answer is IDS.
22.
Zone Alarm is an example of a ________ firewall.
Correct Answer
A. Personal
Explanation
Zone Alarm is an example of a personal firewall. A personal firewall is a type of firewall that is installed on an individual's personal computer or device to protect it from unauthorized access and malicious activities. It provides security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Zone Alarm is a popular personal firewall software that offers features such as intrusion detection, application control, and privacy protection to ensure the safety of personal devices and data.
23.
You need to use multiple antivirus applications on the same computer.
Correct Answer
B. False
Explanation
Using multiple antivirus applications on the same computer is not recommended as they can conflict with each other and cause performance issues. Having multiple antivirus programs running simultaneously can lead to resource conflicts, slow down the computer, and potentially even create false positives or negatives in detecting threats. It is generally advised to use only one reliable antivirus program to ensure proper protection without any conflicts.
24.
You
need to update your antivirus definition files regularly.
Correct Answer
A. True
Explanation
Regularly updating antivirus definition files is important because new viruses and malware are constantly being developed. By updating the antivirus definition files, you ensure that your antivirus software has the latest information on these threats, allowing it to effectively detect and remove them from your system. Failing to update the definition files regularly could leave your computer vulnerable to new and emerging threats. Therefore, the statement "You need to update your antivirus definition files regularly" is true.
25.
Windows updates are not necessary.
Correct Answer
B. False
Explanation
Windows updates are necessary for several reasons. They provide security patches to protect against new threats and vulnerabilities, fix bugs and issues in the operating system, and improve the overall performance and stability of the system. Regularly updating Windows ensures that the system is up to date with the latest features and enhancements, and helps to keep the system running smoothly. Therefore, the statement that Windows updates are not necessary is false.
26.
You can get a virus just by opening and reading your email.
27.
If you want to see unbiased tests of antivirus applications, where do you go?
Correct Answer
C. Av-comparatives.org
Explanation
Av-comparatives.org is the correct answer because it is a reputable website that conducts unbiased tests of antivirus applications. This website provides detailed and objective reviews, comparisons, and rankings of different antivirus software, helping users make informed decisions about which antivirus program to use. It is a reliable source for unbiased information on antivirus applications.
28.
Passwords
stop an intruder who gains physical access to a computer.
Correct Answer
B. False
Explanation
Passwords do not stop an intruder who gains physical access to a computer. Once an intruder has physical access to a computer, they can bypass the password protection by various means, such as resetting the password or accessing the computer's files directly. Therefore, passwords alone are not sufficient to protect against intruders who have physical access to a computer.
29.
How should you protect your wireless network?
Correct Answer
D. All of the above
Explanation
To protect your wireless network, you should implement all of the mentioned measures. Not broadcasting your SSID (Service Set Identifier) makes your network less visible to potential attackers. Using encryption, such as WPA2, ensures that the data transmitted over the network is secure and cannot be easily intercepted. Only allowing known computers to connect to your access point adds an extra layer of security by preventing unauthorized devices from accessing your network. By implementing all of these measures, you can significantly enhance the security of your wireless network.
30.
Encryption should be considered for internal network
traffic as well as external network traffic.
Correct Answer
A. True
Explanation
Encryption should be considered for both internal and external network traffic because it helps to protect sensitive information from unauthorized access or interception. Internal network traffic may still be vulnerable to attacks from insiders or compromised devices, so encrypting the data ensures that even if it is intercepted, it cannot be read without the proper decryption key. Additionally, encrypting internal traffic helps to maintain confidentiality and integrity within the network, preventing unauthorized users from accessing or tampering with sensitive data. Therefore, encryption should be implemented for both internal and external network traffic to ensure the security of the network.
31.
Encrypting
sensitive data on a hard drive means
Correct Answer
B. Only someone who knows the decryption password can see and use it.
Explanation
Encrypting sensitive data on a hard drive ensures that it is protected from unauthorized access. By encrypting the data, it becomes unreadable to anyone who does not have the decryption password. This means that only someone who knows the decryption password can successfully decrypt and view the sensitive data. Additionally, the encryption does not restrict the usage of the data, as the authorized user who knows the decryption password can still use the data once it is decrypted.