Help with some sample test questions?

StYdeSoLaToRStYdeSoLaToR Registered Users Posts: 1 ■□□□□□□□□□
11) Which of the following program uses ICMP?
A) DNS B) FTP C) Telnet D) ping

12) What kind of attack uses multiple computers to attack another computer?
A) Denial of Service
B) Denial of System
C) Distributed Denial of System
D) Distributed Denial of Service


13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
A) DoS B) SYN Snoop C) SYN flood D) SYN flop

14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
A) spoofing B) faking C) spooling D) masking

15) Which of the following is the most important computer resource?
A) processor B) disk space C) memory D) all of the above

16) What best describes CPUHOG?
A) A program that consumes most of the processor’s resources
B) A program that consumes most the memory’s resources
C) A program that consumes most of the hard drive’s resources
D) A program that consumes most of the computer’s resources

17) Which of the following best describes a Trojan horse?
A) A program that requires a host program to run
B) A program that does something other than what it appears to be intended to do
C) A program that contains a mistake in the programming code
D) A self-contained program that can replicate itself.

Comments

  • burner27burner27 Member Posts: 75 ■■□□□□□□□□
    Usually sample test questions have the answers too.
  • earweedearweed Member Posts: 5,192 ■■■■■■■■■□
    #17 really big and made of latex..j/k
    Those are all fairly easy
    No longer work in IT. Play around with stuff sometimes still and fix stuff for friends and relatives.
  • phoeneousphoeneous Member Posts: 2,333 ■■■■■■■□□□
    11) Which of the following program uses ICMP?
    A) DNS B) FTP C) Telnet D) ping

    12) What kind of attack uses multiple computers to attack another computer?
    A) Denial of Service
    B) Denial of System
    C) Distributed Denial of System
    D) Distributed Denial of Service


    13) Which of the following sends packets to a destination but never completes the third step of the TCP handshake?
    A) DoS B) SYN Snoop C) SYN flood D) SYN flop

    14) A hacker modifies the source address of a packet so that it appears to be from a different host. This is known as which of the following?
    A) spoofing B) faking C) spooling D) masking

    15) Which of the following is the most important computer resource?
    A) processor B) disk space C) memory D) all of the above

    16) What best describes CPUHOG?
    A) A program that consumes most of the processor’s resources
    B) A program that consumes most the memory’s resources
    C) A program that consumes most of the hard drive’s resources
    D) A program that consumes most of the computer’s resources

    17) Which of the following best describes a Trojan horse?
    A) A program that requires a host program to run
    B) A program that does something other than what it appears to be intended to do
    C) A program that contains a mistake in the programming code
    D) A self-contained program that can replicate itself.

    This is not a homework forum. These are very simple questions, do your research and learn.
  • redline5thredline5th Member Posts: 119
    Research each subject and learn the concepts.
    WGU - Bachelors in Information Technology

    “The liberty of speaking and writing guards our other liberties.” -- Thomas Jefferson
Sign In or Register to comment.