Which of the following is one of the key features found in a worm but not seen in a virus?
Which of the following is one of the key features found in a worm but not seen in a virus?
Which of the following Database Server was targeted by the slammer worm?
The Slammer Worm exploits a stack-based overflow that occurs in a DLL implementing the Resolution Service.
Which of the following Database Server was targeted by the slammer worm?
which category does this virus belong?
Melissa is a virus that attacks Microsoft Windows platforms.
To which category does this virus belong?
What is the best means of prevention against viruses?
What is the best means of prevention against viruses?
What are the main drawbacks for anti-virus software?
What are the main drawbacks for anti-virus software?
Which of the following tools would allow you to detect unauthorized changes or modifications of binary files o
Virus Scrubbers and other malware detection program can only detect items that they are aware of. Which of the following tools would allow you to detect unauthorized changes or modifications of binary files on your system by unknown malware?
What is Paul seeing here?
Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on hi wireless router. Paul notices when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.
What is Paul seeing here?
Why are SSID not considered to be a good security mechanism to protect a wireless network?
On wireless networks, a SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless network?
What kind of attack is this?
In order to attack wireless network, you put up an access point and override the signal of the real access point. And when users send authentication data, you are able to capture it.
What kind of attack is this?
What is the recommended and well-known GPS mapping package that would interface with PrismStumbler?
Joe Hacker is going wardriving. He is going to use PrismStumbler and wants it to go to a GPS mapping software application. What is the recommended and well-known GPS mapping package that would interface with PrismStumbler?
Select the best answer.