null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
4017483
Security Quiz Review
Descrição
Quiz sobre Security Quiz Review, criado por Rylan Blah em 12-11-2015.
Sem etiquetas
security
nse 4
Quiz por
Rylan Blah
, atualizado more than 1 year ago
Mais
Menos
Criado por
Rylan Blah
aproximadamente 9 anos atrás
522
1
0
Resumo de Recurso
Questão 1
Questão
Which of the following are parts of the attack surface?
Responda
Application
Network
Operating System
Hardware
Questão 2
Questão
Which of the following is the most difficult part of the attack surface to hack?
Responda
Application
Operating System
Network
Questão 3
Questão
Which of the following is the easiest part of the attack surface to hack?
Responda
Application
Operating System
Network
Questão 4
Questão
Population growth is a characteristic of ____________________________
Responda
Self Replicating Malware
Parasitic Malware
Logic Bombs
Questão 5
Questão
Logic Bombs are often
Responda
Self Replicating
Population Growth
Parasitic
Questão 6
Questão
A Trojan Horse is
Responda
Self Replicating
Population Growth
Parasitic
Questão 7
Questão
A Backdoor is likely
Responda
Self Replicating
Population Growth
Parasitic
Questão 8
Questão
A Virus is
Responda
Self-Replicating
Population Growth
Parasitic
Questão 9
Questão
Worms are
Responda
Self-Replicating
Population Growth
Parasitic
Questão 10
Questão
What are the three parts of a virus?
Responda
Infection Mechanism
Trigger
Payload
Replication Mechanism
Questão 11
Questão
For a Virus to be considered a Virus it must have an Infection Mechanism otherwise it could be considered a Logic Bomb.
Responda
True
False
Questão 12
Questão
A Rabbit can be which of the following
Responda
Worm
Fork Bomb
Virus
Questão 13
Questão
The population growth of a rabbit is either zero or very very aggressive.
Responda
True
False
Questão 14
Questão
Parasitic malware does not require some other executable code to exist and can simple use any file on the system.
Responda
True
False
Questão 15
Questão
How would Sun Tzu treat spies who spie on him?
Responda
He would have there head's chopped of because he is a savage.
He would in prison them.
He would treat them well, infact better than his enemy treats them to try and bring them to his side.
Questão 16
Questão
Static Analysis of a program/process involves.
Responda
Analyzing the program while the process is not running.
Analyzing the process while the program is running.
Analyzing the program while the process is running.
Questão 17
Questão
Dynamic Analysis involves analyzing the process while it is running.
Responda
True
False
Questão 18
Questão
To hide the true nature of something is too [blank_start]obfuscate[blank_end] it.
Responda
obfuscate
Questão 19
Questão
What are signs that a program has been packed.
Responda
Very few imports
Very small size
Lots of Strings
Questão 20
Questão
What are signs that a program has been obfuscated?
Responda
Very few Strings
Very few imports
The program has been packed
The size is very small
The program is bigger on disk than it's advertised size
Quer criar seus próprios
Quizzes
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls
Security (1)
Daniel Freedman
Explore a Biblioteca