Words of Wisdom:

"It's easy for an angel to become a devil, but impossible for a devil to become an angel." - Junerock

Cis 522 Final Exam Guide

  • Date Submitted: 09/28/2015 12:23 AM
  • Flesch-Kincaid Score: 53.6 
  • Words: 514
  • Essay Grade: no grades
  • Report this Essay
CIS 522 Final Exam Guide
http://www.homeworkwarehouse.com/downloads/cis-522-final-exam-guide/

CIS 522 Final Exam Guide
• Question 1
Which of the following is not a virus preventative technique?
• Question 2
What is the name of a virus that changes itself when it spreads?
• Question 3
Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?
• Question 4
What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?
• Question 5
Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?
• Question 6
Enumeration can be used to discover all but which of the following types of information?
• Question 7
Installing Netcat on a remote system by using an exploit is an example of what type of attack?
• Question 8
Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?
• Question 9
What can an insecure login system provide?
• Question 10
Which of these describes a database security problem that occurs when actions of database users are not properly tracked?
• Question 11
Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.
• Question 12
Identifying fixes and prevention methods occurs in which of these incident response stages?
• Question 13
Which of the following properly describes an IDS system?
• Question 14
Which of the following is best suited for environments where critical system-level assets need to be monitored?
• Question 15
An incident response team does not respond to which of the following events?
• Question 16
In Linux, which of the following is the account that has complete and unrestricted access?
• Question 17
Who originally designed and created...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments