1.
Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?
A. 
B. 
C. 
D. 
2.
Which of the following are popular examples of denial-of-service attacks? (Choose all that apply.)
A. 
B. 
C. 
D. 
3.
Which of the following is another name for active sniffing?
A. 
B. 
C. 
D. 
4.
During which general type of attack does someone try to disrupt your network and services?
A. 
B. 
Modification and repudiation
C. 
D. 
5.
Which of the following goals of information security refers to identifying events when they occur?
A. 
B. 
C. 
D. 
6.
Which language is seen as a successor to HTML and offers many capabilities that HTML does not?
A. 
B. 
C. 
D. 
7.
Which of the following are common ways to provide secure connections between a web client and a web server? (Choose two.)
A. 
B. 
C. 
D. 
8.
Java applets run in a restricted area of memory. What is this restricted area known as?
A. 
B. 
C. 
D. 
9.
What is the term used when an application receives more data than it is programmed to accept?
A. 
B. 
C. 
D. 
10.
Which file extension is used to indicate a JavaScript file?
A. 
B. 
C. 
D. 
11.
What is the term used for a text file that a browser maintains on a user's hard disk in order to store information about the user?
A. 
B. 
C. 
D. 
12.
Which of the following is the process of systematically identifying a network and its security posture?
A. 
B. 
C. 
D. 
Signal analysis/intelligence
13.
Which type of instant messaging (IM) attack can occur when a user closes one window and dozens of others suddenly pop open?
A. 
B. 
C. 
D. 
14.
What is the term used for an email feature intended to allow the server to forward email to other servers?
A. 
B. 
C. 
D. 
15.
Which protocol is used to manage group or multicasting sessions?
A. 
B. 
C. 
D. 
16.
Which type of instant messaging (IM) problem can occur from a malformed MIME message?
A. 
B. 
C. 
D. 
17.
Which of the following file extensions would not indicate an executable file?
A. 
B. 
C. 
D. 
18.
What is the term used for an exploited email feature originally intended to allow the server to forward email to other servers?
A. 
B. 
C. 
D. 
19.
Which of the following is the process that attackers use to gather information about how your network is configured?
A. 
B. 
C. 
D. 
Signal analysis/intelligence
20.
Which file extension is used to indicate a JPEG file?
A. 
B. 
C. 
D. 
21.
Which type of IM attack is intended to disrupt existing systems by injecting or flooding a channel with garbage data?
A. 
B. 
C. 
D. 
22.
You want to block all web traffic on the firewall, with and without SSL. Which port(s) should you block? (Choose all that apply.)
A. 
B. 
C. 
D. 
23.
Which of the following is not one of the main components of the security triad?
A. 
B. 
C. 
D. 
24.
Which of the following goals of information security refers to preventing computer or information violations from occurring?
A. 
B. 
C. 
D. 
25.
During which general type of attack does someone who should not be able to get access attempt to get to your resources?
A. 
B. 
Modification and repudiation
C. 
D.