Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Certification Exam 100

.doc
Скачиваний:
15
Добавлен:
25.02.2016
Размер:
1.86 Mб
Скачать

82.

Computers that use a dial-up connection to the Internet are typically assigned a _____ IP address.

 (a) dynamic  (b) backbone  (c) permanent  (d) static

Correct answer is

(a)

Your score on this question is:

1.00

Feedback:

   

See Section 5.5.4, subsection "Internet Service Providers," in the course notes.

   

83.

What system is used to translate domain names to IP addresses?

 (a) Routers  (b) DNS  (c) TCP  (d) ISP

Correct answer is

(b)

Your score on this question is:

1.00

Feedback:

   

See Section 5.5.2, subsection "Domain Name Service," in the course notes.

   

84.

An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.

 (a) brute force  (b) cracking  (c) spoofing  (d) social engineering

Correct answer is

(d)

Your score on this question is:

1.00

Feedback:

   

See section 6.1.2, subsection "Social Engineering/Fraud," in the course notes.

   

85.

The dictionary attack against a computer system involves

 (a) trying to guess a password by using various alphanumeric combinations  (b) using complicated words to trick users into providing information  (c) trying to guess a password by using every word in the dictionary  (d) infecting the spell-checker dictionary with macro viruses

Correct answer is

(c)

Your score on this question is:

1.00

Feedback:

   

See section 6.1.2, subsection "Password Cracking," in the course notes.

   

86.

Which of the following is (are) true regarding boot sector viruses?

  1. Boot sector viruses are capable of infecting the system files used by a computer every time the computer is turned on.

  2. Boot sector viruses are capable of causing widespread damage and problems that reoccur.

 (a) I only  (b) II only  (c) None  (d) I and II

Correct answer is

(d)

Your score on this question is:

1.00

Feedback:

   

See Chapter 4, page 186, in the course textbook.

   

87.

Which of the following is (are) true regarding computer viruses?

  1. When a computer executes a program that is infected with a computer virus, it also executes the attached virus instructions.

  2. In a computer infected with a virus, the virus instructions that are executed generally remain in RAM and are capable of infecting the next program that runs on that computer.

 (a) None  (b) I and II  (c) I only  (d) II only

Correct answer is

(b)

Your score on this question is:

1.00

Feedback:

   

See Chapter 4, page 185, in the course textbook.

   

88.

Which of the following means of providing password information to Internet Service Providers is (are) considered safe?

  1. Phone

  2. Email

 (a) None  (b) II only  (c) I only  (d) I and II

Correct answer is

(a)

Your score on this question is:

1.00

Feedback:

   

See section 6.1.2, subsection "Spoofing," in the course notes.

   

89.

Capabilities of computer viruses include which of the following?

  1. The ability to remain in a computer for long periods without showing any external symptoms and quietly replicating themselves during this period

  2. The ability to perform trigger events that are keyed to a specific date

  3. The ability to spread from one computer to another by itself

 (a) I, II, and III  (b) II and III only  (c) I and II only  (d) I only

Correct answer is

(c)

Your score on this question is:

1.00

Feedback:

   

See Chapter 4, page 185, in the course textbook.

   

90.

The set of standards and services that govern the use of public-key cryptography and the system of certificates is called

 (a) the digital certificate  (b) SSL protocols  (c) PKI  (d) the certificate authority

Correct answer is

(c)

Your score on this question is:

1.00

Feedback:

   

See section 6.2.3, subsection "Digital Certificates and Certificate Authorities," in the course notes.

   

91.

The set of all possible keys for an encryption algorithm is known as its

 (a) keyspace  (b) cryptography factor  (c) cipher count  (d) brute force

Correct answer is

(a)

Your score on this question is:

1.00

Feedback:

   

See section 6.2.1, subsection "Substitution Cipher," in the course notes.

   

92.

Features used for identification in biometrics include which of the following?

  1. Fingerprints

  2. Name

  3. Voice

 (a) II and III only  (b) I, II, and III  (c) I and II only  (d) I and III only

Correct answer is

(d)

Your score on this question is:

1.00

Feedback:

   

See section 6.2.3, subsection "Biometrics," in the course notes.

   

93.

Which of the following is (are) true regarding digital signatures?

  1. Digitally signing a message automatically encrypts the message.

  2. Senders use their private key to create the digital signature, while receivers use the sender's public key to decrypt the digital signature.

 (a) None  (b) I and II  (c) I only  (d) II only

Correct answer is

(d)

Your score on this question is:

0.00

Feedback:

   

See section 6.2.3, subsection "Digital Signatures," in the course notes.

   

94.

The identification of individuals based on their physiological or behavioral characteristics is known as _____ identification.

 (a) SSL  (b) biometric  (c) digital-signature  (d) digital-identifier

Correct answer is

(b)

Your score on this question is:

1.00

Feedback:

   

See section 6.2.3, subsection "Biometrics," in the course notes.

   

95.

A backup that makes a fresh copy of every file that exists in the folder specified for backup is known as a(n)

 (a) entire backup  (b) full backup  (c) total backup  (d) complete backup

Correct answer is

(b)

Your score on this question is:

1.00

Feedback:

   

See Chapter 4, page 196, in the course textbook.

   

96.

Which of the following precautions can users take to avoid executing malicious code?

  1. Avoid opening unexpected email attachments.

  2. Generate secure passwords.

  3. Expose hidden filename extensions.

 (a) I, II, and III  (b) I and II only  (c) II and III only  (d) I and III only

Correct answer is

(d)

Your score on this question is:

1.00

Feedback:

   

See section 6.3.4 in the course notes.

   

97.

Which of the following is (are) true regarding computer security?

  1. Extreme computer security measures may adversely affect the functionality of the computer.

  2. Using antivirus software and installing a firewall can keep a computer safe from all intrusions.

  3. Most intrusions result from virus attacks or known vulnerabilities that could be prevented by keeping the operating system and applications updated.

 (a) I, II, and III  (b) II and III only  (c) I and II only  (d) I and III only

Correct answer is

(d)

Your score on this question is:

1.00

Feedback:

   

See section 6.3.4 in the course notes.

   

98.

Which of the following is (are) true regarding the use of backup software?

  1. The type of backup software that is needed depends on the backup plan.

  2. Backup software is available that can enable the scheduling of automatic backups of predetermined files and folders at predetermined times.

 (a) II only  (b) I only  (c) I and II  (d) None

Correct answer is

(c)

Your score on this question is:

1.00

Feedback:

   

See Chapter 4, pages 200–201, in the course textbook.

   

99.

Assume that a full backup is taken on Saturdays and an incremental backup is taken on all other days of the week. If a disk crash occurs on Thursday, which of the following backup disks would be needed for restoration?

  1. The full backup disk taken the last Saturday before the crash

  2. The incremental backup disk taken on Wednesday (the day before the crash)

  3. The incremental backup disks taken on Sunday, Monday, and Tuesday

 (a) I only  (b) I, II, and III  (c) II and III only  (d) I and II only

Correct answer is

(b)

Your score on this question is:

0.00

Feedback:

   

See Chapter 4, page 196, in the course textbook.

   

100.

Functions of network monitoring systems include which of the following?

  1. Analyzing network packets and decoding the analyzed data

  2. Testing the availability of network services

  3. Notifying system administrators regarding network problems

 (a) I, II, and III  (b) I and III only  (c) I and II only  (d) II and III only

Correct answer is

(a)

Your score on this question is:

1.00

Feedback:

   

See section 6.3.2, subsection "Network Monitoring Tools," in the course notes.

   

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]