•What
is the easiest method to get a password?
–Brute-force
cracking
–Guessing
–Dictionary
attack
–Hybrid
attack
•Which
of
the following is a passive online attack?
–Password
guessing
–Network
sniffing
–Brute-force
attack
–Dictionary
attack
•How
do you remove a Trojan from a system?
–Search
the Internet for freeware removal tools.
–Purchase
commercially available tools to remove the Trojan.
–Reboot
the system.
–Uninstall
and reinstall all applications.
•What is
the difference between a backdoor and a Trojan?
–A
Trojan usually provides a backdoor for a hacker.
–A
backdoor must be installed first.
–A
Trojan is not a way to access a system.
–A
backdoor is provided only through a virus, not through a Trojan.
•What
type of virus modifies itself to avoid detection?
–Stealth
virus
–Polymorphic
virus
–Multipartite
virus
–Armored
virus
•
•What is a
covert channel?
–Using
a communications channel in a way that was not intended
–Tunneling
software
–A
Trojan removal tool
–Using
a communications channel in the original, intended way
•Which
of the following are the best indications of a virus attack? (Choose all that
apply.)
–Any
anomalous behavior
–Unusual
program opening or closing
–Strange
pop-up messages
–Normal
system operations as most viruses run in the background
–Files
–System
sectors
–Memory
–CPU
–DLL
files
•What
is cryptography?
–The
study of computer science
–The
study of mathematics
–The
study of encryption
–The
creation of encryption algorithms
•What
is the process of changing the order of some characters in an encryption key?
–Transposition
–Subtraction
–Substitution
–Transrelation
•How many
keys exist in a public/private key pair?
–A. 1 B. 2
C. 3 D. 4
•Which cryptographic attack attempts to crack the code by looking for patterns and using statistical analysis?
–Cipher
text–only attack
–Chosen–plain
text attack
–Chosen–cipher
text attack
–Brute-force
attack
•What is
the goal of a known–plain text attack?
–To
read the encrypted data
–To
gain access to the public key
–To
discover the encryption key
–To
validate the sender of the data
•Why
would hackers want to cover their tracks?
–To
prevent another person from using the programs they have installed on a target
sys-
–tem
–To
prevent detection or discovery
–To
prevent hacking attempts
–To
keep other hackers from using their tools
•What is
the process of hiding text within an image called?
–Steganography
–Encryption
–Spyware
–Keystroke
logging
•What is
privilege escalation?
–Creating
a user account with higher privileges
–Creating
a user account with administrator privileges
–Creating
two user accounts: one with high privileges and one with lower privileges
–Increasing
privileges on a user account
Useful Post, i Request you to write more blogs like this Data Science Online Training Hyderabad
ReplyDelete