Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

Choose the best answer.



1

What type of attack do flooder hackers use when overwhelming a web site with service requests?
A)DoS
B)spam
C)virus
D)worm
2

When do interceptor hackers actually do the most damage?
A)before they comprise your network
B)after they compromise your network
C)when they intercept e-mail
D)when they intercept web pages
3

What do inspector hackers do on a compromised network?
A)delete files
B)impersonate users
C)look around
D)manipulate folders
4

What type of threat occurs when an unauthorized outsider calls a user, pretends to be an authorized person, and convinces the user to reveal their password?
A)bait and switch
B)dumpster diving
C)honey pot
D)social engineering
5

What should be the first step in protecting a computer network?
A)anti-virus software
B)password protection
C)physical security
D)spyware removal software
6

What key(s) are used in a strong asymmetric key methodology?
A)private key
B)public key
C)private and public keys
D)shared key
7

What can best be set up to control registry edits, restrict logon hours, or prevent software installations?
A)DMZ
B)encryption
C)NOS
D)policies
8

What is the protected segment on a company's network in front of the Internet?
A)digital certificate
B)digital signature
C)DMZ
D)OU
9

What is the encoding process that restricts outsiders from seeing your data?
A)encryption
B)inheritance
C)VLANs
D)WLANs
10

What constitutes the majority of network threats in an organization?
A)external threats
B)internal threats
C)packet filtering
D)port blocking







Network +Online Learning Center

Home > Chapter 17 > Multiple Choice Quiz