網路入侵偵測(75)

75 | Attempts: 145
Share

SettingsSettingsSettings
網路入侵偵測(75) - Quiz

題庫總共75題,其選項採隨機方式!


Questions and Answers
  • 1. 

    __________ is the act of obtaining unauthorized access to a network by manipulating authorized users in to revealing their passwords and access information

    • A.

      Social Engineering

    • B.

      Sniffing

    • C.

      Scanning

    • D.

      Reverse Engineering

    Correct Answer
    A. Social Engineering
  • 2. 

    ______________ refers to the pre-attack phase when the attacker scans the network with specific information gathered during reconnaissance.

    • A.

      Sniffing

    • B.

      Spoofing

    • C.

      Parsing

    • D.

      Scanning

    Correct Answer
    D. Scanning
  • 3. 

    The objective of __________ is to authenticate based on username, password, smart cards, tokens or PINs. a. user authentication

    • A.

      Network authentication

    • B.

      User authentication

    • C.

      Host authentication

    • D.

      Resource authentication

    Correct Answer
    B. User authentication
  • 4. 

    ____________should begin with the identification of audience and objective of the particular report

    • A.

      Case investigation

    • B.

      Case Classification

    • C.

      Cross examination

    • D.

      Report writing

    Correct Answer
    D. Report writing
  • 5. 

     ____________ is a proxy server that doesn’t have special caching abilities of a caching HTTP proxy server.

    • A.

      Protocol Analyzer

    • B.

      SOCKS

    • C.

      Anonymizer

    • D.

      Transparent Proxy

    Correct Answer
    B. SOCKS
  • 6. 

    The __________________ characterizes the organization’s idea of an apt computer, usage of the network and measures to deal with the network incidents.

    • A.

      Acceptable use policy

    • B.

      Disaster recovery policy

    • C.

      Security policy

    • D.

      Network policy

    Correct Answer
    D. Network policy
  • 7. 

    _________ is a program that handles external servers on behalf of internal servers.

    • A.

      NAT

    • B.

      Proxy

    • C.

      Firewall

    • D.

      SOCKS

    Correct Answer
    B. Proxy
  • 8. 

    The authentication process is done by exchanging a set of messages between a pair of entities, usually called as an _________________ protocol.

    • A.

      Authentication

    • B.

      Acceptable risk

    • C.

      Authentication

    • D.

      DSA Risk

    Correct Answer
    A. Authentication
  • 9. 

    ______ is an online utility that helps an investigator/user to search for copyright records

    • A.

      LOCUS

    • B.

      AXED

    • C.

      LOCIS

    • D.

      AXIS

    Correct Answer
    C. LOCIS
  • 10. 

    Network forensics poses greater challenges as:

    • A.

      Evidence is stationary on the network and multiple locations are involved

    • B.

      There cannot be multiple investigators across multiple systems

    • C.

      Evidence is found across multiple systems and is volatile

    • D.

      Evidence is captured in the whole only with the use of a network forensic tool

    Correct Answer
    C. Evidence is found across multiple systems and is volatile
  • 11. 

    _______ contain events generated by system component and deals with driver failures and hardware issues.

    • A.

      Event Log

    • B.

      System Log

    • C.

      Event Log

    • D.

      Application Log

    Correct Answer
    B. System Log
  • 12. 

    ___________is a file system designed specifically for the OS/2 operating system to improve upon the limitations of the FAT file system.

    • A.

      HPFS

    • B.

      OSPF

    • C.

      HSPF

    • D.

      FSOS

    Correct Answer
    A. HPFS
  • 13. 

    A _____________ is an application program that is used to identify an unknown or forgotten password to a computer or network resource.

    • A.

      Password hacker

    • B.

      Password cropper

    • C.

      Password hasher

    • D.

      Password cracker

    Correct Answer
    D. Password cracker
  • 14. 

     ____________ defines the way in which messages are transmitted over the Internet.

    • A.

      SNMP

    • B.

      SMTP

    • C.

      HTTP

    • D.

      POP

    Correct Answer
    C. HTTP
  • 15. 

    _______________ refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack.

    • A.

      Scanning

    • B.

      Footprinting

    • C.

      Reconnaissance

    • D.

      Sniffing

    Correct Answer
    C. Reconnaissance
  • 16. 

    ________ is a procedure by which a router changes data in packets to modify the network addresses

    • A.

      Packet filter

    • B.

      Firewall

    • C.

      NAT

    • D.

      Proxy

    Correct Answer
    C. NAT
  • 17. 

    Common digital signature algorithms that are used include ______

    • A.

      ASA and DSA

    • B.

      MSA and RSA

    • C.

      MSA and ASA

    • D.

      RSA and DSA

    Correct Answer
    D. RSA and DSA
  • 18. 

    The basic function of ___________is transmission of data over the communication channel. 

    • A.

      Data link layer

    • B.

      Data layer

    • C.

      Transmission layer

    • D.

      Physical layer

    Correct Answer
    D. Physical layer
  • 19. 

    A ____________ indicates successful access gained by the user and __________ stands for the unsuccessful attempt made to gain the access.

    • A.

      Failure event, success event

    • B.

      Success event, failed event

    • C.

      Success event, unsuccessful event

    • D.

      Stateful packet filtering

    Correct Answer
    B. Success event, failed event
  • 20. 

    ____________ of the e-mail message has key role to play in e-mail tracing as it contains the unique IP a. a. address of the server that sent the message.

    • A.

      Option

    • B.

      Key

    • C.

      Header

    • D.

      Signature

    Correct Answer
    C. Header
  • 21. 

    Computer crimes pose certain challenges to solving the crime. These include:

    • A.

      Speed at which crime is detected, anonymity, evidence recovery

    • B.

      Speed at which crime is committed, anonymity, volatility of evidence

    • C.

      Speed at which crime is committed, disclosure, evidence recovery

    • D.

      Speed at which crime is committed, anonymity, volatility of evidence

    Correct Answer
    B. Speed at which crime is committed, anonymity, volatility of evidence
  • 22. 

    ___________ is an incident process in which a person or software program acting on behalf of any other person takes some action and then denies them to do it later.

    • A.

      Retraction

    • B.

      Repudiation

    • C.

      Non Committal

    • D.

      Non Disclosure

    Correct Answer
    B. Repudiation
  • 23. 

    ______ is a standard for encrypting and digitally signing electronic mail that contains attachments and for offering secure data transmissions.

    • A.

      SSH

    • B.

      SSL

    • C.

      Secure MIME

    • D.

      HTTPS

    Correct Answer
    C. Secure MIME
  • 24. 

    ____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities

    • A.

      Grey Hats

    • B.

      Red Hats

    • C.

      Black Hats

    • D.

      White Hats

    Correct Answer
    C. Black Hats
  • 25. 

    In a ____________________, the IDS examine activity on each individual computer or host.

    • A.

      Network based

    • B.

      Hardware based

    • C.

      Software based

    • D.

      Host based

    Correct Answer
    D. Host based
  • 26. 

    In a ____________________, the IDS examine activity on each individual computer or host.

    • A.

      Denial of Service

    • B.

      Keylogging

    • C.

      Phishing

    • D.

      Spamming

    Correct Answer
    A. Denial of Service
  • 27. 

    A ___________is any circumstance or event that has the potential to cause harm to a system or network a. Vulnerability

    • A.

      Threat

    • B.

      Vulnerability

    • C.

      Disaster

    • D.

      Attack

    Correct Answer
    A. Threat
  • 28. 

    The BIOS program is usually in the _______memory location

    • A.

      FFFF0h

    • B.

      EEEE0e

    • C.

      DDDD0d

    • D.

      MMMM0m

    Correct Answer
    A. FFFF0h
  • 29. 

    An ______________is a person who can investigate on a particular case, evaluate all findings, and educate the jury about his findings.

    • A.

      Jury Member

    • B.

      Court Reporter

    • C.

      Crime Reporter

    • D.

      Expert witness

    Correct Answer
    D. Expert witness
  • 30. 

    An ________can be an event or set of events that threatens the security in computing systems and networks in any organization

    • A.

      Outbreak

    • B.

      Event log

    • C.

      Outbreak

    • D.

      Incident

    Correct Answer
    D. Incident
  • 31. 

    __________ is a system integrity check tool.

    • A.

      Sysinternals

    • B.

      MSBS

    • C.

      Limewire

    • D.

      Tripwire

    Correct Answer
    D. Tripwire
  • 32. 

    ________________ can be said to be a security violation that results from a threat action.

    • A.

      Rating

    • B.

      Ranking

    • C.

      Disclosure

    • D.

      Exposure

    Correct Answer
    D. Exposure
  • 33. 

    An ____________ gathers and analyzes information from various areas within a computer, or network, in order to identify possible violations of security policy, including unauthorized access, as well as misuse.

    • A.

      Extensible firewall

    • B.

      Outbound packet filter

    • C.

      Alert rule

    • D.

      Intrusion detection system

    Correct Answer
    D. Intrusion detection system
  • 34. 

    The computer forensic investigator must maintain ___________whenever a case is being investigated.

    • A.

      Objectivity

    • B.

      Personal judgement

    • C.

      Perspective

    • D.

      Subjectivity

    Correct Answer
    A. Objectivity
  • 35. 

    _______ is a malicious program that replicates it self until it fills all of the storage space on a drive or a. network

    • A.

      Worm

    • B.

      Bot

    • C.

      Virus

    • D.

      Trojan

    Correct Answer
    A. Worm
  • 36. 

    Investigators must document digital evidence by creating an _________________

    • A.

      Album of evidence

    • B.

      Evidence Recovery Form

    • C.

      Evidence Diary

    • D.

      Evidence form

    Correct Answer
    D. Evidence form
  • 37. 

    Any ____________involves three phases – preparation, conduct and conclusion. a. Security testing

    • A.

      Security testing

    • B.

      Security reporting

    • C.

      Security finding

    • D.

      Security probing

    Correct Answer
    A. Security testing
  • 38. 

    Running a program that remotely finds ports opened and closed on remote systems, represents one of the most common types of __________attacks.

    • A.

      Reverse Mapping

    • B.

      Reconnaissance

    • C.

      Rendezvous

    • D.

      Re-engineering

    Correct Answer
    B. Reconnaissance
  • 39. 

    _______________firewalls concentrates on individual packets and analyzes their header information and which way they are directed to

    • A.

      Host based

    • B.

      Packet filter based

    • C.

      Network based

    • D.

      Role based

    Correct Answer
    B. Packet filter based
  • 40. 

    __________ is the technique attackers use to gain access to a network, sending messages to a computer with an IP address indicating that the message is coming from a trusted host.

    • A.

      MAC Flooding

    • B.

      Phishing

    • C.

      Cloning

    • D.

      IP Spoofing

    Correct Answer
    D. IP Spoofing
  • 41. 

    E-mail crime can be categorized in two ways: one committed by sending mails and other _______

    • A.

      Supported by e-mails

    • B.

      Categorized by crime

    • C.

      Sender’s location

    • D.

      ISP involved

    Correct Answer
    A. Supported by e-mails
  • 42. 

    __________ is the art and science of hiding information by embedding messages within other, seemingly harmless messages.

    • A.

      Concurrency

    • B.

      Encryption

    • C.

      Compression

    • D.

      Steganography

    Correct Answer
    D. Steganography
  • 43. 

    The ___________ is a unique identifier that is used to establish, and maintain, wireless connectivity and acts as a single shared password between access points and clients.

    • A.

      SSDI

    • B.

      SSLD

    • C.

      DSDL

    • D.

      SSID

    Correct Answer
    D. SSID
  • 44. 

    IPSec aids two encryption modes:

    • A.

      Transfer and Transport

    • B.

      Transport and Tunnel

    • C.

      Telegraphic and Tunnel

    • D.

      Twist and Tunnel

    Correct Answer
    B. Transport and Tunnel
  • 45. 

    The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed over several machines

    • A.

      Distributed denial of service

    • B.

      Bot

    • C.

      Zombie

    • D.

      Discrete denial of service

    Correct Answer
    A. Distributed denial of service
  • 46. 

    Proxy based firewalls concentrate on the _____________ rather than just the packets

    • A.

      Transport Layer

    • B.

      Network Layer

    • C.

      Physical Layer

    • D.

      Application Layer

    Correct Answer
    D. Application Layer
  • 47. 

     _____________ monitors system files to determine whether an intruder has changed the system files.

    • A.

      System Indicative Verifiers

    • B.

      System Indicative Verifiers

    • C.

      System Integrity Verifiers

    • D.

      System Change Implementers

    Correct Answer
    C. System Integrity Verifiers
  • 48. 

    Cyber Crime is divided into the two T’s

    • A.

      Time and Task of the crime

    • B.

      Time and Tools of the crime

    • C.

      Time and Target of the crime

    • D.

      Tools and Target of the crime

    Correct Answer
    D. Tools and Target of the crime
  • 49. 

    A ___________ is a private network of computers that uses the public Internet to connect some nodes.

    • A.

      VPN

    • B.

      UseNet

    • C.

      FINNet

    • D.

      Routing Table

    Correct Answer
    A. VPN
  • 50. 

     __________ is a means for ensuring private, secure communication between hosts over an insecure medium using tunneling.

    • A.

      IPSEC

    • B.

      SSL

    • C.

      VPN

    • D.

      SSH

    Correct Answer
    C. VPN

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 05, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 04, 2013
    Quiz Created by
    Kiwi3534
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.