1. Which of the following is a type of denial of service attack? A. Ping of Death B. Stacheldraht C. SYN flood D. All of the above
2. Which is not a type of threat that can affect your network? A. Worm B. Phishing C. Access control list D. Rogue access point
3. Which type of virus impacts files with the filename extensions .com, .exe, and .dll? A. File viruses B. SYN flood C. Smurf D. Tribe Flood Network
4. In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop? A. War driving B. Evil twin C. WEP cracking D. WPA cracking
5. Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus? A. IP spoofing B. Multipartite C. Macro D. Boot sector
6. Which type of virus affects both the boot sector and files on a computer? A. Mulipartite B. Macro C. Tribe Flood Network 2000 (TFN2K) D. Smurf
8. What kind of attack involves the hacker attempting all combinations of characters for a password to gain access? A. Packet sniffers B. Brute-force attack C. Worm D. Backdoor
9. What type of security threat allows an attacker to learn your password through the use of an email or phone call? A. Phishing B. Trust-exploration attack C. Man-in-the-middle attack D. Rogue access point
10. Which type of policy should be implemented to secure important company documents and materials when employees leave their workstations? A. Clean housekeeping B. Clean desk C. Security audit D. Proactive defense
11. If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures, what type of attack can you prevent? A. DoS B. Man-in-the-middle attacks C. Smurf D. Social engineering
12. What type of wireless frame populates the display when someone is scanning for wireless networks? A. Probe response B. Beacon C. SSID D. Discovery
14. Which of the following security mechanisms has been compromised? A. WEP B. 802.11i C. WPA-2 D. RADIUS
15. What process allows you to update your Windows-based operating system? A. Technet B. Windows Update C. Text message D. Hotfix
17. Which value does a wireless station use to choose an access point? A. Signal-to-noise ratio B. MAC address C. SSID D. Channel number
18. Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it? A. Update scan B. Signature-file scan C. Database scan D. Heuristic scan
19. What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses? A. Definition files B. Email files C. DOC (.doc) files D. EXE (.exe) files
20. What type of scan can be done by an antivirus program? A. Emergency B. In-demand C. On-access D. All of the above