Help with some sample test questions?

in Security+
11) Which of the following program uses ICMP?
A) DNS
FTP C) Telnet D) ping
12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service
Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS
SYN Snoop C) SYN flood D) SYN flop
14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing
faking C) spooling D) masking
15) Which of the following is the most important computer resource?
A) processor
disk space C) memory D) all of the above
16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources
A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run
A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.
A) DNS

12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service

C) Distributed Denial of System
D) Distributed Denial of Service
13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS

14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing

15) Which of the following is the most important computer resource?
A) processor

16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources

C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources
17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run

C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.
Comments
Those are all fairly easy
This is not a homework forum. These are very simple questions, do your research and learn.
“The liberty of speaking and writing guards our other liberties.” -- Thomas Jefferson