1.
April Fools' Day 2009 saw concern on the internet around which new worm?
Correct Answer
C. Conficker
Explanation
In April Fools' Day 2009, there was widespread concern on the internet regarding the Conficker worm. This worm was a malicious software that targeted Microsoft Windows operating systems. It spread primarily through network vulnerabilities and infected millions of computers worldwide. The Conficker worm had the ability to disable security features, steal personal information, and create a botnet for further attacks. Its widespread presence and potential for damage caused significant concern and prompted increased security measures during that time.
2.
What is the name for the part of the wireless signal which synchronizes traffic?
Correct Answer
C. Preamble
Explanation
The correct answer is "Preamble". In wireless communication, the preamble is a part of the signal that is used to synchronize the transmission and reception of data. It contains a specific pattern of bits that allows the receiving device to detect the start of a transmission and establish the necessary timing and synchronization for proper data transfer. The preamble is essential for ensuring reliable and accurate communication between devices in a wireless network.
3.
What term applies to a group of computers infected with code allowing external control?
Correct Answer
D. Botnet
Explanation
A botnet is a term used to describe a group of computers that have been infected with malicious code, allowing them to be controlled externally. This network of compromised computers can be used by cybercriminals to carry out various activities, such as launching coordinated attacks, distributing spam emails, or stealing sensitive information. The term "botnet" is derived from the words "robot" and "network," illustrating the automated nature of these infected machines working together under the control of a central command.
4.
What type of cyber-attack involves attaching other activities to an innocent-seeming link?
Correct Answer
B. Clickjacking
Explanation
Clickjacking is a type of cyber-attack that involves attaching other activities to an innocent-seeming link. In clickjacking, the attacker tricks the user into clicking on a link or button that appears harmless but actually performs a different action, such as downloading malware or granting unauthorized access. This technique allows the attacker to deceive the user and carry out malicious activities without their knowledge or consent.
5.
A drop in VoIP quality when using many other programs on a PC can be attributed to what?
Correct Answer
B. Processor Drain
Explanation
A drop in VoIP quality when using many other programs on a PC can be attributed to Processor Drain. When a PC is running multiple programs simultaneously, it puts a heavy load on the processor, causing it to slow down and struggle to handle the tasks efficiently. This can result in a decrease in the performance of VoIP applications, leading to a drop in quality.
6.
What general-purpose Internet encryption protocol, published in 1999, derived from SSL?
Correct Answer
D. TLS
Explanation
TLS (Transport Layer Security) is the correct answer because it is a general-purpose Internet encryption protocol that was published in 1999. TLS is derived from SSL (Secure Sockets Layer), which was the predecessor to TLS. TLS is widely used to provide secure communication over the internet, ensuring that data transmitted between a client and a server is encrypted and protected from eavesdropping or tampering.
7.
What designation is given to the part of the radio spectrum used for wireless networking?
Correct Answer
C. ISM Band
Explanation
The designation given to the part of the radio spectrum used for wireless networking is the ISM Band. ISM stands for Industrial, Scientific, and Medical, and this band is reserved for non-licensed use. It allows for the transmission of signals for various purposes, including wireless networking, without the need for obtaining specific licenses. This band is commonly used for Wi-Fi communication, Bluetooth devices, and other wireless technologies.
8.
What term refers to using a mouse to initiate a voice communication?
Correct Answer
B. Click To Call
Explanation
Click To Call refers to using a mouse to initiate a voice communication. This term is commonly used in the context of online communication or customer service, where a user can click on a button or link on a website to directly initiate a phone call with a representative or contact. By clicking on the designated area, the user's call is instantly connected, allowing for immediate voice communication without the need for dialing or manually entering phone numbers.
9.
What general term is used to describe a program that reports on one computer to another?
Correct Answer
A. Agent
Explanation
An agent is a general term used to describe a program that reports on one computer to another. Agents are typically used in network management systems to monitor and report on the status and performance of various devices and systems. They can collect data, send it to a central server, and perform various tasks based on the instructions received from the server. Agents are often used in remote monitoring and management scenarios, where they provide real-time information and enable administrators to take appropriate actions.
10.
What does "PGP" stand for in an early home encryption tool?
Correct Answer
C. Pretty Good Privacy
Explanation
PGP stands for Pretty Good Privacy in an early home encryption tool. This encryption tool was developed in 1991 by Phil Zimmermann and was designed to provide secure communication and data encryption. PGP uses a combination of symmetric-key and public-key cryptography to ensure the privacy and integrity of data. It became widely popular as a means to protect sensitive information, such as emails, files, and documents, from unauthorized access and interception.
11.
What term is used for PC software to emulate telephone functionality via VoIP?
Correct Answer
A. SoftpHone
Explanation
A softphone is a term used for PC software that emulates telephone functionality via VoIP (Voice over Internet Protocol). It allows users to make and receive phone calls over the internet using their computer instead of a traditional telephone. This software typically includes features such as call management, voicemail, and contact lists, providing a convenient and cost-effective solution for communication.
12.
A pair of one-way encryption keys, one public and one private, is termed what?
Correct Answer
D. Asymmetric
Explanation
The correct answer is "Asymmetric." This term refers to a pair of one-way encryption keys, one public and one private, that are used in asymmetric encryption algorithms. In this type of encryption, the public key is used to encrypt data, while the private key is used to decrypt it. The public key can be freely shared, allowing anyone to encrypt messages that only the holder of the private key can decrypt. This provides a secure means of communication and is commonly used in various cryptographic systems.
13.
In 2008, Dan Kaminsky found a major flaw in what critical networking service?
Correct Answer
B. DNS
Explanation
In 2008, Dan Kaminsky discovered a significant vulnerability in the DNS (Domain Name System) protocol. This flaw allowed attackers to exploit the way DNS resolves domain names into IP addresses, potentially leading to various malicious activities such as redirecting users to fake websites or intercepting sensitive information. The discovery of this flaw prompted a major effort to patch and secure DNS systems worldwide.
14.
The revised USB 3.0 standard is expected to be up to how many times faster than USB 2.0?
Correct Answer
A. 10
Explanation
The revised USB 3.0 standard is expected to be up to 10 times faster than USB 2.0. This means that data transfer rates will be significantly improved, allowing for faster file transfers and quicker device syncing. USB 3.0 also offers higher power output, making it more efficient for charging devices. Overall, the upgrade to USB 3.0 provides a substantial improvement in speed and performance compared to the previous USB 2.0 standard.
15.
Used in VoIP, "SIP" is an abbreviation for which protocol?
Correct Answer
C. Session Initiation Protocol
Explanation
SIP stands for Session Initiation Protocol, which is a protocol used in VoIP (Voice over Internet Protocol) systems. It is responsible for initiating, modifying, and terminating communication sessions between two or more participants. It is widely used for voice and video calls, instant messaging, multimedia conferences, and other real-time communication applications.