CIS 522 Final Exam Guide

8
CIS 522 Final Exam Guide http://www.homeworkwarehouse.com/downloads/cis- 522-final-exam-guide/ CIS 522 Final Exam Guide Question 1 Which of the following is not a virus preventative technique? Question 2 What is the name of a virus that changes itself when it spreads? Question 3

description

CIS 522 Final Exam Guide

Transcript of CIS 522 Final Exam Guide

CIS 522 Final Exam Guidehttp://www.homeworkwarehouse.com/downloads/cis-522-final-exam-guide/

CIS 522 Final Exam Guide

Question 1

Which of the following is not a virus preventative technique?Question 2

What is the name of a virus that changes itself when it spreads?

Question 3 Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?Question 4 What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?Question 5

Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?Question 6

Enumeration can be used to discover all but which of the following types of information?Question 7

Installing Netcat on a remote system by using an exploit is an example of what type of attack?Question 8

Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?Question 9 What can an insecure login system provide?Question 10 Which of these describes a database security problem that occurs when actions of database users are not properly tracked?Question 11

Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.Question 12

Identifying fixes and prevention methods occurs in which of these incident response stages?Question 13

Which of the following properly describes an IDS system?Question 14

Which of the following is best suited for environments where critical system-level assets need to be monitored?Question 15

An incident response team does not respond to which of the following events?Question 16

In Linux, which of the following is the account that has complete and unrestricted access?Question 17

Who originally designed and created Linux?Question 18

Most versions of Linux make their source code available through which of the following methods?Question 19

Approximately how many distributions of Linux are available in different forms and formats?Question 20 Which of the following is not a target of Trojans?Question 21 Which of the following ports does Back Orifice communicate on?Question 22 Which of the following terms describes a malware program that helps the attacker gain remote access to a system?Question 23 Which of the following describes valid protection against malware?Question 24 Which sniffer tool is designed to intercept and reveal passwords?Question 25

Which of the following is defined in Title 18, Section 2511 of the U.S. Code on electronic crimes?Question 26 Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?Question 27 Which of the following communication methods employs security mechanisms called trusted devices?Question 28 What capability is provided by inSSIDer?Question 29

Why is WPA2 superior to WPA?Question 30 Factors that affect the emanations of a wireless network include all but which one of the following?