CHP Quiz 2
CHP Quiz 2
Page 1 of 7
Submitted by Cotto,William on 10/9/2013 10:26:30 PM Points Awarded 14.00 Points Missed Percentage 6.00 70.0%
1. How many days of the month does the Code Red worm replicate? A) 15 B) 19 Feedback: Correct. C) 23 D) 29 Correct Answer(s): B
3. Backdoor.Egghead is an example of a worm that is spread by buffer overflows. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Correct Answer(s): B
Fi
Points Earned:
1.0/1.0
ll P
C) macro D) multipartite
DF
Ed
ito
2. A _____ virus appends to program files such as system files, executable files, driver files, and supplementary files, including .dlls. A) partition sector B) file infector Feedback: Correct.
rw
ith
Fr ee
rit
er an d
To
ols
Points Earned:
1.0/1.0
Test 2
Page 2 of 7
4. What was one reason the Slammer worm was successful against SQL Server database servers in early 2003? A) It gained access through a previously unknown vulnerability in SQL server B) Many administrators had not installed new patches designed to block this attack Feedback: Correct. C) It was a polymorphic worm that rapidly changed signatures D) It was a stealth worm that was difficult to detect Points Earned: 1.0/1.0 Correct Answer(s): B
6. Which of the following is an example of a Red Hat Linux file that can be the target of a virus? A) autoexec.bat B) inittab Feedback: Correct. C) startup.ncf D) win.ini Points Earned: 1.0/1.0 Correct Answer(s): B
7. In Red Hat Linux, what mode do you need to be in to run the fdisk/mbr utility which replaces the MBR?
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
DF
Ed
ito
Points Earned:
1.0/1.0
rw
ith
Fr ee
rit
er an d
5. Can the VCatch Basic Anti-virus program be used both in Windows and Linux environments? A) True B) False
To
ols
Test 2
Page 3 of 7
A) Safe B) Rescue Feedback: Correct. C) Recovery D) MBR Points Earned: 1.0/1.0 Correct Answer(s): B
8. Software exploitation is particularly aimed at new software and new software versions. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Correct Answer(s): True
10.
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
9. Which of the following is an example of a Netware 6.x file that can be the target of a virus? A) autoexec.bat B) startup.ncf Feedback: Incorrect.
DF
Ed
ito
rw
ith
Fr ee
Points Earned:
1.0/1.0
rit
er an d
To
ols
Test 2
Page 4 of 7
11. The first stage of virus spread that occurs is replication within the infected system. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False
12. Which anti-virus software is available for use on Macintosh, NetWare, UNIX/Linux, and Windowsbased systems? A) AntiVir Personal Edition B) HandyBits VirusScan
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
DF
Ed
ito
Correct Answer(s): B
rw
Points Earned:
1.0/1.0
ith
Fr ee
What is displayed in the figure above? A) Windows Update Setup Wizard B) Red Hat Network Alert Notification Tool Feedback: Correct.
rit
er an d
To
ols
Test 2
Page 5 of 7
C) McAfee VirusScan D) Sophos Anti-Virus Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): D
13. The W32.Pinfi virus is an example of a destructive virus that can infect Mac OS systems. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 0.0/1.0 Correct Answer(s): False
Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
15. Does Windows 2000 use an ASR set to recover from a system failure? A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect.
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
DF
14. Should you create a new ASR set each time you add a protocol or install a new driver for a network interface card? A) True B) False
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
Test 2
Page 6 of 7
Points Earned:
1.0/1.0
16. Which of the following operating systems uses an emergency repair disk? A) Windows 2000 Server B) Windows 2000 Pro C) Windows XP Pro D) Windows 2003 Server Feedback: Incorrect. E) Both a and b Points Earned: 0.0/1.0 Correct Answer(s): E
18. The Code Red worm replicates for the first 23 days of the month and then stops. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
19. A(n) boot sector virus typically infects or replaces the instructions in the MBR or the Partition Boot Sector.
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
DF
Ed
ito
C) 3 D) 4
rw
ith
Fr ee
17. How many copies of the ASR set should you have for a server? A) 1 B) 2 Feedback: Correct.
rit
er an d
To
ols
Test 2
Page 7 of 7
A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/14/2013
PD
Fi
ll P
DF
Continue
Ed
ito
rw
ith
Fr ee
rit
er an d
20. A _____ virus can infect systems through multiple means, particularly through boot or partition sectors and through executable files. A) boot sector Feedback: Incorrect.
To
ols