Cis 522 Final Exam Guide

Submitted by: Submitted by

Views: 10

Words: 514

Pages: 3

Category: Literature

Date Submitted: 09/23/2015 02:11 AM

Report This Essay

CIS 522 Final Exam Guide

http://www.homeworkwarehouse.com/downloads/cis-522-final-exam-guide/

CIS 522 Final Exam Guide

• Question 1

Which of the following is not a virus preventative technique?

• Question 2

What is the name of a virus that changes itself when it spreads?

• Question 3

Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?

• Question 4

What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?

• Question 5

Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?

• Question 6

Enumeration can be used to discover all but which of the following types of information?

• Question 7

Installing Netcat on a remote system by using an exploit is an example of what type of attack?

• Question 8

Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?

• Question 9

What can an insecure login system provide?

• Question 10

Which of these describes a database security problem that occurs when actions of database users are not properly tracked?

• Question 11

Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.

• Question 12

Identifying fixes and prevention methods occurs in which of these incident response stages?

• Question 13

Which of the following properly describes an IDS system?

• Question 14

Which of the following is best suited for environments where critical system-level assets need to be monitored?

• Question 15

An incident response team does not respond to which of the following events?

• Question 16

In Linux, which of the following is the account that has complete and unrestricted access?

• Question 17

Who originally designed and created...