Which of the following is not a virus preventative technique?
• Question 2
What is the name of a virus that changes itself when it spreads?
• Question 3
Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?
• Question 4
What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?
• Question 5
Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?
• Question 6
Enumeration can be used to discover all but which of the following types of information?
• Question 7
Installing Netcat on a remote system by using an exploit is an example of what type of attack?
• Question 8
Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?
• Question 9
0 out of 2.6667 points
What can an insecure login system provide?
• Question 10
Which of these describes a database security problem that occurs when actions of database users are not properly tracked?
• Question 11
Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.
• Question 12
Identifying fixes and prevention methods occurs in which of these incident response stages?
• Question 13
Which of the following properly describes an IDS system?
• Question 14
Which of the following is best suited for environments where critical system-level assets need to be monitored?
• Question 15
An incident response team does not respond to which of the...
No comments