Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [64]

By Root 3093 0
attack use to conduct the attack?

a. TCP

b. IP

c. UDP

d. ICMP

9. Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this?

a. Spoofing

b. Replay attack

c. Social engineering

d. Trojan horse

10. A user calls you in a panic. He is receiving e-mails from people indicating that he is inadvertently sending viruses to them. Over 200 such e-mails have arrived today. Which type of attack has most likely occurred?

a. SAINT

b. Back door attack

c. Worm

d. TCP/IP hijacking

11. Your system has just stopped responding to keyboard commands. You noticed that this occurred when a spreadsheet was open and you dialed in to the Internet. Which kind of attack has probably occurred?

a. Logic bomb

b. Worm

c. Virus

d. ACK attack

12. You’re explaining the basics of security to upper management in an attempt to obtain an increase in the networking budget. One of the members of the management team mentions that they’ve heard of a threat from a virus that attempts to mask itself by hiding code from antivirus software. What type of virus is he referring to?

a. Armored virus

b. Polymorphic virus

c. Worm

d. Stealth virus

13. What kind of virus could attach itself to the boot sector of your disk to avoid detection and report false information about file sizes?

a. Trojan horse virus

b. Stealth virus

c. Worm

d. Polymorphic virus

14. A mobile user calls you from the road and informs you that his laptop is exhibiting erratic behavior. He reports that there were no problems until he downloaded a tic-tac-toe program from a site that he had never visited before. Which of the following terms describes a program that enters a system disguised in another program?

a. Trojan horse virus

b. Polymorphic virus

c. Worm

d. Armored virus

15. Your system has been acting strangely since you downloaded a file from a colleague. Upon examining your antivirus software, you notice that the virus definition file is missing. Which type of virus probably infected your system?

a. Polymorphic virus

b. Retrovirus

c. Worm

d. Armored virus

16. Internal users are reporting repeated attempts to infect their systems as reported to them by pop-up messages from their virus scanning software. According to the pop-up messages, the virus seems to be the same in every case. What is the most likely culprit?

a. A server is acting as a carrier for a virus.

b. You have a worm virus.

c. Your antivirus software has malfunctioned.

d. A DoS attack is under way.

17. Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing?

a. Password guessing attack

b. Back door attack

c. Worm attack

d. TCP/IP hijacking

18. A user reports that he is receiving an error indicating that his TCP/IP address is already in use when he turns on his computer. A static IP address has been assigned to this user’s computer, and you’re certain this address was not inadvertently assigned to another computer. Which type of attack is most likely underway?

a. Man-in-the-middle attack

b. Back door attack

c. Worm

d. TCP/IP hijacking

19. You’re working late one night, and you notice that the hard disk on your new computer is very active even though you aren’t doing anything on the computer and it isn’t connected to the Internet. What is the most likely suspect?

a. A disk failure is imminent.

b. A virus is spreading in your system.

c. Your system is under a DoS attack.

d. TCP/IP hijacking is being attempted.

20. You’re the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your e-mail system error log reports a large number of unsuccessful attempts to log on. It’s apparent

Return Main Page Previous Page Next Page

®Online Book Reader