Help with some sample test questions?
StYdeSoLaToR
Registered Users Posts: 1 ■□□□□□□□□□
in Security+
11) Which of the following program uses ICMP?
A) DNS FTP C) Telnet D) ping
12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service
Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS SYN Snoop C) SYN flood D) SYN flop
14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing faking C) spooling D) masking
15) Which of the following is the most important computer resource?
A) processor disk space C) memory D) all of the above
16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources
A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run
A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.
A) DNS FTP C) Telnet D) ping
12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service
Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS SYN Snoop C) SYN flood D) SYN flop
14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing faking C) spooling D) masking
15) Which of the following is the most important computer resource?
A) processor disk space C) memory D) all of the above
16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources
A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run
A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.
Comments
-
earweed Member Posts: 5,192 ■■■■■■■■■□#17 really big and made of latex..j/k
Those are all fairly easyNo longer work in IT. Play around with stuff sometimes still and fix stuff for friends and relatives. -
phoeneous Member Posts: 2,333 ■■■■■■■□□□StYdeSoLaToR wrote: »11) Which of the following program uses ICMP?
A) DNS FTP C) Telnet D) ping
12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service
Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS SYN Snoop C) SYN flood D) SYN flop
14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing faking C) spooling D) masking
15) Which of the following is the most important computer resource?
A) processor disk space C) memory D) all of the above
16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources
A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run
A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.
This is not a homework forum. These are very simple questions, do your research and learn. -
redline5th Member Posts: 119Research each subject and learn the concepts.WGU - Bachelors in Information Technology
“The liberty of speaking and writing guards our other liberties.” -- Thomas Jefferson