Security+ Chapter 2
Start
Congratulations - you have completed Security+ Chapter 2.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
What is the difference between a SAN and a NAS
A | A SAN has security, where a NAS does not. |
B | NASs are more expensive and very high performance, where a SAN is more economical but slower. |
C | A NAS has security, where a SAN does not. |
D | SANs are more expensive and very high performance, where a NAS is more economical but slower. |
Question 2 |
What is an infected host who is part of a large number of computers under the control of an attacker called?
A | Zombie |
B | Bastion host |
C | Bot herder |
D | Bot |
Question 3 |
The individual who is in charge of a bot-net is called a:
A | Bastion host |
B | Bot herder |
C | Zombie |
D | NetAdmin |
Question 4 |
_________ is a program designed to take advantage of vulnerabilities in applications or operating systems that does not require user intercession?
A | Logic bomb |
B | Worm |
C | Virus |
D | Trojan horse |
Question 5 |
What is a benefit of virtualization?
A | Gives you the ability to make a "dual-boot" machine |
B | Makes us less efficient on hardware, but provides better performance |
C | No longer requires security because they are not physical machines |
D | Gives us the ability to install many virtual machines on a single physical machine |
Question 6 |
The software that runs on a physical computer and manages one or more virtual machine operating systems is called
A | EEPROM |
B | Hypervisor |
C | Bot Herder |
D | PROM |
Question 7 |
What is a program that masquerades as a program you want but concurrently performs malicious tasks?
A | Trojan Horse |
B | Logic Bomb |
C | Virus |
D | Rootkit |
Question 8 |
What is a term for software that imposes on a user's privacy or security?
A | Adware |
B | Anti-securityware |
C | Spyware |
D | Antivirus |
Question 9 |
_______ is a program that secretly attaches to another document or program and executes when it is opened?
A | Trojan horse |
B | Logic bomb |
C | Worm |
D | Virus |
Question 10 |
What is a hardware or software device that can monitor what you type?
A | Spyware |
B | Keylogger |
C | Keyboard capturer |
D | Malware |
Question 11 |
What is the general term for software that enters a computer system without the owner's knowledge or consent?
A | SQL injection |
B | Malware |
C | Cross-site scripting |
D | Trojan horse |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 11 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!