Day 4 review Sec+

Day 4 review Sec+

12th Grade

11 Qs

quiz-placeholder

Similar activities

แบบทดสอบหน่วยที่ 1 ความหมายและประโยชน์ของเครือข่ายคอมพิวเตอร

แบบทดสอบหน่วยที่ 1 ความหมายและประโยชน์ของเครือข่ายคอมพิวเตอร

1st - 12th Grade

10 Qs

Virtual Private Server

Virtual Private Server

12th Grade

15 Qs

Control Panel Hosting

Control Panel Hosting

12th Grade

15 Qs

OCR Sys Arch J277

OCR Sys Arch J277

10th - 12th Grade

16 Qs

Evaluasi TLJ 3

Evaluasi TLJ 3

12th Grade

10 Qs

Unit 2, 1.3 Types of information access and storage devices

Unit 2, 1.3 Types of information access and storage devices

12th Grade

11 Qs

Internet Technology

Internet Technology

10th Grade - University

10 Qs

Operating system

Operating system

11th - 12th Grade

10 Qs

Day 4 review Sec+

Day 4 review Sec+

Assessment

Quiz

Computers

12th Grade

Easy

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker attempts to access a server during a zone transfer to get access to the zone records. What type of server are they trying to manipulate/exploit?

DNS server

Proxy server

File server

Web server

Answer explanation

DNS servers are the only types of servers listed that do zone transfers. The purpose of accessing the zone file is to find out what hosts are on the network.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of ARP?

Resolves IP addresses to DNS names

Resolves IP addresses to hostnames

Resolves IP addresses to MAC addresses

Resolves IP addresses to DNS addresses

Answer explanation

The Address Resolution Protocol, or ARP, resolves IP addresses to MAC addresses. DNS resolves from IP addresses to hostnames, and vice versa. RARP is Reverse ARP; it resolves MAC addresses to IP addresses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common symptom of adware?

Infected files

Computer shuts down

Applications freeze

Pop-up windows

Answer explanation

Pop-up windows are common to spyware. The rest of the answers are more common symptoms of viruses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two ways in which you can stop employees from using USB flash drives? (Select the best answers.)

Utilize RBAC.

Disable USB devices in the BIOS.

Enable MAC filtering.

Enable IP filtering.

Answer explanation

By disabling all USB devices in the BIOS, users cannot use their flash drive.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malicious attack executes when certain conditions are met?

Virus

Worm

Bluejacking

Logic Bomb

Answer explanation

A logic bomb is a malicious attack that executes at a specific time. Viruses normally execute when a user inadvertently runs them. Worms can selfreplicate at will. And bluejacking deals with Bluetooth devices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tim believes that his computer has a worm. What is the best tool to remove the worm?

Antivirus software

Firewall

IDS

IPS

Answer explanation

Antivirus software is the best option when removing a worm. It may be necessary to boot into Safe Mode to remove this worm when using antivirus software.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following defines the difference between a Trojan horse and a worm? (Select the best answer.)

The two are the same.

Worms are sent via e-mail; Trojan horses are not.

Worms self-replicate but Trojan horses do not.

Trojan horses are malicious attacks; worms are not.

Answer explanation

The primary difference between a Trojan horse and a worm is that worms will self-replicate without any user intervention; Trojan horses do not self replicate.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?