11) Which of the following program uses ICMP?
A) DNS

FTP C) Telnet D) ping
12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service

Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS

SYN Snoop C) SYN flood D) SYN flop
14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing

faking C) spooling D) masking
15) Which of the following is the most important computer resource?
A) processor

disk space C) memory D) all of the above
16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources

A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run

A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.