星期四, 9月 23, 2010

Introduction to network security threats

1. Which of the following definitions refers to data becoming corrupt due to incorrect inputting procedures?

Choose an option.

Malicious threat
Inappropriate activity
Nuisance threat
Accidental loss

2. Which of the following terms describes the event whereby a hacker installs a virus on your computer and then tries to make you inadvertently activate it?

Choose an option.

Denial of Service (DoS)
Trojan horse
Packet sniffing
E-mail spoofing

3. Which of the following should be disabled in order to discern whether a file is a virus?

Choose an option.

Hide file extensions for known file types in Windows
Java, JavaScript, and Active X in browsers
Denial of Service (DoS)
Chat sites

推薦此文