Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

Which of the following programs do attackers install on a system to ensure continued unrestricted access to a system?
A)Backdoor
B)Sniffer
C)Macro virus
D)Malware
2

What is the process of taking control over an existing session between a client and a server called?
A)IP spoofing
B)Replay attack
C)Session hijacking
D)WarDriving
3

What piece of malicious code replicates by attaching itself to another piece of executable code?
A)Bug
B)Trojan horse
C)Virus
D)Worm
4

Which virus attaches itself to an executable file?
A)Boot sector virus
B)Macro virus
C)Program virus
D)Worm
5

Which type of virus is hard to detect as it changes its own code to evade matching a virus signature?
A)Boot sector virus
B)Macro virus
C)Polymorphic virus
D)Stealthy virus
6

Which type of virus spreads by infecting documents?
A)Macro virus
B)Polymorphic virus
C)Program virus
D)Stealthy virus
7

Which process assesses the security state of an organization by comparing it against an established standard?
A)Accounting
B)Auditing
C)Sniffing
D)Tunneling
8

In which of the following types of attacks does an attacker use a network of attack agents to deny access to a service or system?
A)Birthday
B)Dictionary
C)DDOS
D)DOS
9

Which piece of malicious code hides its real functionality by appearing to be a useful software or program?
A)Bug
B)Trojan horse
C)Virus
D)Worm
10

Which of the following software or hardware devices observes traffic passing through a network on shared broadcast media?
A)Router
B)Sniffer
C)Switch
D)Trapdoor







Security+ and BeyondOnline Learning Center

Home > Chapter 15 > Multiple Choice Quiz