13.3.9 Practice Questions

Which of the following statements about the use of anti-virus software is correct?
If servers on a network have anti-virus software installed, workstations do not need
anti-virus software installed on them.
If you install anti-virus software, you no longer need a firewall on your network.
Anti-virus software should be configured to download updated virus definition files as
soon as they become available.
Once installed, anti-virus software needs to be updated on a monthly basis.

Anti-virus software should be configured to download updated virus definition files as soon as they become available.

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an
example of which kind of attack?
Backdoor
Spamming
DDoS
Replay
DoS

DDoS

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to
flood a victim with echo requests using a bounce/amplification network?
Fingerprinting
Session hijacking
Fraggle
Smurf

Smurf

An attacker captures packets as they travel from one host to another with the intent of altering
the contents of the packets. Which type of attack is being executed?
Spamming
Distributed denial of service
Man-in-the-middle attack
Passive logging

Man-in-the-middle attack

Which option is a program that appears to be a legitimate application, utility, game, or
screensaver and performs malicious activities surreptitiously?
ActiveX controls
Trojan horse
Outlook Express
Worm

Trojan horse

Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
Spamming
Spoofing
Snooping
Sniffing

Spoofing

An attacker sends an unwanted and unsolicited email message to multiple recipients with an
attachment that contains malware.
What kind of attack has occurred in this scenario?
Repudiation attack
Spam
Open SMTP relay
Phishing

Spam

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
What kind of exploit has been used in this scenario? (Select two. Both responses are different
names for the same exploit.)
DNS poisoning
Pharming
Reconnaissance
Domain name kiting
Man-in-the-middle

DNS poisoning Pharming

A programmer that fails to check the length of input before processing leaves his code vulnerable
to what form of common attack?
Privilege escalation
Backdoor
Session hijacking
Buffer overflow

Buffer overflow

You have installed anti-malware software that checks for viruses in email attachments. You
configure the software to quarantine any files with problems.
You receive an email with an important attachment, but the attachment is not there. Instead,
you see a message that the file has been quarantined by the anti-malware software.
What has happened to the file?
The infection has been removed, and the file has been saved to a different location.
It has been moved to a secure folder on your computer.
The file extension has been changed to prevent it from running.
It has been deleted from your system.

It has been moved to a secure folder on your computer.

If your anti-virus software does not detect and remove a virus, what should you try first?
Update your virus detection software.
Search for and delete the file you believe to be infected.
Scan the computer using another virus detection program.
Set the read-only attribute of the file you believe to be infected.

Update your virus detection software.

Which of the following measures are you most likely to implement to protect a system from a
worm or Trojan horse?
Antivirus software
Password policy
IPsec
Firewall

Antivirus software

To tightly control the anti-malware settings on your computer, you elect to update the signature
file manually. Even though you vigilantly update the signature file, the machine becomes infected
with a new type of malware.
Which of the following actions would best prevent this scenario from occurring again?
Configure the software to automatically download the virus definition files as soon as
they become available.
Carefully review open firewall ports and close any unneeded ports.
Switch to a more reliable anti-virus software.
Create a scheduled task to run sfc.exe daily.

Configure the software to automatically download the virus definition files as soon as they become available.

You have installed anti-virus software on the computers on your network. You update the
definition and engine files and configure the software to update those files every day.
What else should you do to protect your systems from malware? (Select two.)
Schedule regular full system scans.
Enable account lockout.
Disable UAC.
Educate users about malware.
Enable chassis intrusion detection.

Schedule regular full system scans. Educate users about malware.

While using the internet, you type the URL of one of your favorite sites in the browser. Instead of
going to the correct site, the browser displays a completely different website. When you use the
IP address of the web server, the correct site is displayed.
Which type of attack has likely occurred?
Hijacking
Man-in-the-middle
DNS poisoning
Spoofing

DNS poisoning

13.3.9 Practice Questions - Subjecto.com

13.3.9 Practice Questions

Your page rank:

Total word count: 808
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following statements about the use of anti-virus software is correct?
If servers on a network have anti-virus software installed, workstations do not need
anti-virus software installed on them.
If you install anti-virus software, you no longer need a firewall on your network.
Anti-virus software should be configured to download updated virus definition files as
soon as they become available.
Once installed, anti-virus software needs to be updated on a monthly basis.

Anti-virus software should be configured to download updated virus definition files as soon as they become available.

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an
example of which kind of attack?
Backdoor
Spamming
DDoS
Replay
DoS

DDoS

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to
flood a victim with echo requests using a bounce/amplification network?
Fingerprinting
Session hijacking
Fraggle
Smurf

Smurf

An attacker captures packets as they travel from one host to another with the intent of altering
the contents of the packets. Which type of attack is being executed?
Spamming
Distributed denial of service
Man-in-the-middle attack
Passive logging

Man-in-the-middle attack

Which option is a program that appears to be a legitimate application, utility, game, or
screensaver and performs malicious activities surreptitiously?
ActiveX controls
Trojan horse
Outlook Express
Worm

Trojan horse

Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
Spamming
Spoofing
Snooping
Sniffing

Spoofing

An attacker sends an unwanted and unsolicited email message to multiple recipients with an
attachment that contains malware.
What kind of attack has occurred in this scenario?
Repudiation attack
Spam
Open SMTP relay
Phishing

Spam

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
What kind of exploit has been used in this scenario? (Select two. Both responses are different
names for the same exploit.)
DNS poisoning
Pharming
Reconnaissance
Domain name kiting
Man-in-the-middle

DNS poisoning Pharming

A programmer that fails to check the length of input before processing leaves his code vulnerable
to what form of common attack?
Privilege escalation
Backdoor
Session hijacking
Buffer overflow

Buffer overflow

You have installed anti-malware software that checks for viruses in email attachments. You
configure the software to quarantine any files with problems.
You receive an email with an important attachment, but the attachment is not there. Instead,
you see a message that the file has been quarantined by the anti-malware software.
What has happened to the file?
The infection has been removed, and the file has been saved to a different location.
It has been moved to a secure folder on your computer.
The file extension has been changed to prevent it from running.
It has been deleted from your system.

It has been moved to a secure folder on your computer.

If your anti-virus software does not detect and remove a virus, what should you try first?
Update your virus detection software.
Search for and delete the file you believe to be infected.
Scan the computer using another virus detection program.
Set the read-only attribute of the file you believe to be infected.

Update your virus detection software.

Which of the following measures are you most likely to implement to protect a system from a
worm or Trojan horse?
Antivirus software
Password policy
IPsec
Firewall

Antivirus software

To tightly control the anti-malware settings on your computer, you elect to update the signature
file manually. Even though you vigilantly update the signature file, the machine becomes infected
with a new type of malware.
Which of the following actions would best prevent this scenario from occurring again?
Configure the software to automatically download the virus definition files as soon as
they become available.
Carefully review open firewall ports and close any unneeded ports.
Switch to a more reliable anti-virus software.
Create a scheduled task to run sfc.exe daily.

Configure the software to automatically download the virus definition files as soon as they become available.

You have installed anti-virus software on the computers on your network. You update the
definition and engine files and configure the software to update those files every day.
What else should you do to protect your systems from malware? (Select two.)
Schedule regular full system scans.
Enable account lockout.
Disable UAC.
Educate users about malware.
Enable chassis intrusion detection.

Schedule regular full system scans. Educate users about malware.

While using the internet, you type the URL of one of your favorite sites in the browser. Instead of
going to the correct site, the browser displays a completely different website. When you use the
IP address of the web server, the correct site is displayed.
Which type of attack has likely occurred?
Hijacking
Man-in-the-middle
DNS poisoning
Spoofing

DNS poisoning

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending