Security Quiz Review

Descripción

Test sobre Security Quiz Review, creado por Rylan Blah el 12/11/2015.
Rylan Blah
Test por Rylan Blah, actualizado hace más de 1 año
Rylan Blah
Creado por Rylan Blah hace casi 9 años
515
1

Resumen del Recurso

Pregunta 1

Pregunta
Which of the following are parts of the attack surface?
Respuesta
  • Application
  • Network
  • Operating System
  • Hardware

Pregunta 2

Pregunta
Which of the following is the most difficult part of the attack surface to hack?
Respuesta
  • Application
  • Operating System
  • Network

Pregunta 3

Pregunta
Which of the following is the easiest part of the attack surface to hack?
Respuesta
  • Application
  • Operating System
  • Network

Pregunta 4

Pregunta
Population growth is a characteristic of ____________________________
Respuesta
  • Self Replicating Malware
  • Parasitic Malware
  • Logic Bombs

Pregunta 5

Pregunta
Logic Bombs are often
Respuesta
  • Self Replicating
  • Population Growth
  • Parasitic

Pregunta 6

Pregunta
A Trojan Horse is
Respuesta
  • Self Replicating
  • Population Growth
  • Parasitic

Pregunta 7

Pregunta
A Backdoor is likely
Respuesta
  • Self Replicating
  • Population Growth
  • Parasitic

Pregunta 8

Pregunta
A Virus is
Respuesta
  • Self-Replicating
  • Population Growth
  • Parasitic

Pregunta 9

Pregunta
Worms are
Respuesta
  • Self-Replicating
  • Population Growth
  • Parasitic

Pregunta 10

Pregunta
What are the three parts of a virus?
Respuesta
  • Infection Mechanism
  • Trigger
  • Payload
  • Replication Mechanism

Pregunta 11

Pregunta
For a Virus to be considered a Virus it must have an Infection Mechanism otherwise it could be considered a Logic Bomb.
Respuesta
  • True
  • False

Pregunta 12

Pregunta
A Rabbit can be which of the following
Respuesta
  • Worm
  • Fork Bomb
  • Virus

Pregunta 13

Pregunta
The population growth of a rabbit is either zero or very very aggressive.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
Parasitic malware does not require some other executable code to exist and can simple use any file on the system.
Respuesta
  • True
  • False

Pregunta 15

Pregunta
How would Sun Tzu treat spies who spie on him?
Respuesta
  • He would have there head's chopped of because he is a savage.
  • He would in prison them.
  • He would treat them well, infact better than his enemy treats them to try and bring them to his side.

Pregunta 16

Pregunta
Static Analysis of a program/process involves.
Respuesta
  • Analyzing the program while the process is not running.
  • Analyzing the process while the program is running.
  • Analyzing the program while the process is running.

Pregunta 17

Pregunta
Dynamic Analysis involves analyzing the process while it is running.
Respuesta
  • True
  • False

Pregunta 18

Pregunta
To hide the true nature of something is too [blank_start]obfuscate[blank_end] it.
Respuesta
  • obfuscate

Pregunta 19

Pregunta
What are signs that a program has been packed.
Respuesta
  • Very few imports
  • Very small size
  • Lots of Strings

Pregunta 20

Pregunta
What are signs that a program has been obfuscated?
Respuesta
  • Very few Strings
  • Very few imports
  • The program has been packed
  • The size is very small
  • The program is bigger on disk than it's advertised size
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls
Security (1)
Daniel Freedman