null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
4017483
Security Quiz Review
Description
Quiz on Security Quiz Review, created by Rylan Blah on 12/11/2015.
No tags specified
security
nse 4
Quiz by
Rylan Blah
, updated more than 1 year ago
More
Less
Created by
Rylan Blah
about 9 years ago
521
1
0
Resource summary
Question 1
Question
Which of the following are parts of the attack surface?
Answer
Application
Network
Operating System
Hardware
Question 2
Question
Which of the following is the most difficult part of the attack surface to hack?
Answer
Application
Operating System
Network
Question 3
Question
Which of the following is the easiest part of the attack surface to hack?
Answer
Application
Operating System
Network
Question 4
Question
Population growth is a characteristic of ____________________________
Answer
Self Replicating Malware
Parasitic Malware
Logic Bombs
Question 5
Question
Logic Bombs are often
Answer
Self Replicating
Population Growth
Parasitic
Question 6
Question
A Trojan Horse is
Answer
Self Replicating
Population Growth
Parasitic
Question 7
Question
A Backdoor is likely
Answer
Self Replicating
Population Growth
Parasitic
Question 8
Question
A Virus is
Answer
Self-Replicating
Population Growth
Parasitic
Question 9
Question
Worms are
Answer
Self-Replicating
Population Growth
Parasitic
Question 10
Question
What are the three parts of a virus?
Answer
Infection Mechanism
Trigger
Payload
Replication Mechanism
Question 11
Question
For a Virus to be considered a Virus it must have an Infection Mechanism otherwise it could be considered a Logic Bomb.
Answer
True
False
Question 12
Question
A Rabbit can be which of the following
Answer
Worm
Fork Bomb
Virus
Question 13
Question
The population growth of a rabbit is either zero or very very aggressive.
Answer
True
False
Question 14
Question
Parasitic malware does not require some other executable code to exist and can simple use any file on the system.
Answer
True
False
Question 15
Question
How would Sun Tzu treat spies who spie on him?
Answer
He would have there head's chopped of because he is a savage.
He would in prison them.
He would treat them well, infact better than his enemy treats them to try and bring them to his side.
Question 16
Question
Static Analysis of a program/process involves.
Answer
Analyzing the program while the process is not running.
Analyzing the process while the program is running.
Analyzing the program while the process is running.
Question 17
Question
Dynamic Analysis involves analyzing the process while it is running.
Answer
True
False
Question 18
Question
To hide the true nature of something is too [blank_start]obfuscate[blank_end] it.
Answer
obfuscate
Question 19
Question
What are signs that a program has been packed.
Answer
Very few imports
Very small size
Lots of Strings
Question 20
Question
What are signs that a program has been obfuscated?
Answer
Very few Strings
Very few imports
The program has been packed
The size is very small
The program is bigger on disk than it's advertised size
Show full summary
Hide full summary
Want to create your own
Quizzes
for
free
with GoConqr?
Learn more
.
Similar
CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls
Security (1)
Daniel Freedman
Browse Library