Đề Trắc Nghiệm Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin EPU
Tổng hợp đề thi trắc nghiệm môn Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin, được thiết kế phù hợp với chương trình học tại Đại học Điện Lực (EPU). Đề thi bao gồm các nội dung trọng tâm như từ vựng, thuật ngữ chuyên ngành và kỹ năng đọc hiểu tài liệu liên quan đến an ninh mạng và bảo mật thông tin. Tài liệu miễn phí kèm đáp án chi tiết, hỗ trợ sinh viên ôn tập hiệu quả và chuẩn bị tốt nhất cho kỳ thi.
Từ khoá: đề thi trắc nghiệm Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin EPU Đại học Điện Lực ôn tập tiếng Anh chuyên ngành học bảo mật thông tin kiểm tra kiến thức đề thi miễn phí tài liệu an ninh mạng đáp án chi tiết
Câu 1: Vince Cerf invented what?
D. The first computer virus
Câu 2: The first computer incident-response team is affiliated with what university?
A. Massachusetts Institute of Technology
B. Carnegie-Mellon University
D. California Technical University
Câu 3: Which of the following is a vulnerability scanner specifically for Windows systems?
Câu 4: … is embedded in some web pages, and when a user visits those web pages, she is given a fake virus scan that tells her she has a virus and it needs to be fixed. The “fix” is actually downloading a virus.
Câu 5: This is any attack that attempts to breach your website
Câu 6: A workload for a computer system may be defined by the number of simultaneous users, the size of files, the speed of data.........., or the amount of data stored.
Câu 7: In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
Câu 8: Which of the following is not a valid IP address?
Câu 9: What kind of connection type has 64 Kbps speed?
Câu 10: What kind of cable has speed up to 20MHz/100Mbps and uses for Data lines, Ethernet networks?
Câu 11: The most common place to encounter a firewall is … your network and the outside world.
Câu 12: It is a fairly typical virus in that it spreads primarily through email, but it also uses file sharing utilities to copy itself. It copies itself to various directories and shared folders. In one interesting twist, it attempts to copy itself to C:\WINDOWS\FVProtect.exe. The name would make many people (including otherwise technically savvy people) think this program was actually part of some antivirus utility. It also copies itself to C:\WINDOWS\userconfig9x.dll. Again, it would appear to be a system file, thus making people less likely to delete it. What is it?
Câu 13: What kind of connection type has 1.54 Mbps speed?
Câu 14: What is the malware?
A. a generic term for software that has a malicious purpose
B. an antivirus security software for computer
C. unknown software which steal user information
D. software which protect computer system
Câu 15: Some well-known Trojan horses such as the 2nd Thought application that downloads to a person’s PC and then blasts it with ...
Câu 16: If you wish to view items that have been removed from a website, what is the best way to do that?
Câu 17: A Vietnamese name of a router is…
Câu 18: The first computer incident-response team is affiliated with what university?
A. Massachusetts Institute of Technology
B. Carnegie-Mellon University
D. California Technical University
Câu 19: Which of the following is a major resource for detailed information on a computer virus?
B. The Microsoft Virus Library
C. The F-Secure Virus Library
D. The National Virus Repository
Câu 20: What is war-driving?
A. Driving and seeking a computer job
B. Driving while using a wireless connection to hack
C. Driving looking for wireless networks to hack
D. Driving and seeking rival hackers
Câu 21: Another new type of virus has been gaining popularity in the past few years, and that is the “… virus” or, put simply, a hoax. Rather than actually writing a virus, a hacker sends an email to every address he has. The email claims to be from some well-known antivirus center and warns of a new virus that is circulating. The email instructs people to delete some file from their computer to get rid of the virus. The file, however, is not really a virus but part of a computer’s system.
Câu 22: A more advanced form of a polymorphic virus is called the … virus; it can completely change itself.
Câu 23: What class would the IP address of 193.44.34.12 be?
Câu 24: Which layer of the OSI model is divided into two sublayers?
Câu 25: DoS attack does not even ............to intrude on your system or to obtain sensitive information;
Câu 26: What common tools used for Dos mentioned in “Computer Security Fundamentals”?
Câu 27: What can you do with a firewall to help protect against virus attacks?
A. Close all incoming ports.
C. Shut down all unneeded ports.
Câu 28: What kind of connection type has 128 Kbps speed?
Câu 29: In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
Câu 30: An intrusion detection system is an example of which of the following?
D. Good security practices
Câu 31: Mimail had its own built-in …, so it did not have to “piggy back” off your email client
Câu 32: What is SAM?
A. Security Accounts Manager
B. Service Access Manager
C. Service Accounts Media
Câu 33: This “mail reader” program is made by Mozilla Foundation. What is it?
Câu 34: Which of the following is not one of the three major classes of threats?
A. Attempts to intrude on the system
C. Denial of service attacks
Câu 35: The name comes from the fact that the Internet is full of utilities and scripts that one can download to perform some hacking tasks. Many of these tools have an easy-to use graphical user interface that allows someone with very little if any skill to operate the tool. A classic example is the Low Earth Orbit Ion Cannon tool for executing a DoS attack. Someone who downloads such a tool without really understanding the target system is considered a script kiddy. A significant number of the people you are likely to encounter who call themselves hackers are, in reality, mere ...
Câu 36: What is abbreviation of DoS?
C. distributed denial of service
Câu 37: This particular piece of spyware (the 2nd Thought application) is one that downloads to your PC when you visit certain websites. It is benign in that it causes no direct harm to your system or files, nor does it gather sensitive information from your PC. However, it is incredibly annoying as it inundates your machine with unwanted ...
Câu 39: It includes virus attacks, worms, adware, Trojan horses, and spyware. What is it
Câu 40: What web server service can you use that mentions Computer Security Fundamentals?
B. Apache, IIS, or any web server
C. vFabric Web Server 5.1.1
D. All answers are correct
Câu 41: What is spyware?
A. Any software that monitors your system
B. Only software that logs keystrokes
C. Any software used to gather intelligence
D. Only software that monitors what websites you visit
Câu 42: A virus will usually spread primarily in one of two ways. The first is to simply … your computer for connections to a network and then … itself to other machines on the network to which your computer has access. This is actually the most efficient way for a virus to spread.
Câu 43: What other way can a virus scanner work?
A. By blocking files that copy themselves.
B. By blocking all unknown files.
C. By looking at files for virus-like behavior.
Câu 45: A T1 line sends data at what speed?
Câu 46: This virus, which first appeared in 2012, targeted Windows operating systems. The first item that makes this virus notable is that it was specifically designed by the U.S. government for espionage. It was discovered in May 2012 at several locations, including Iranian government sites. It is spyware that can monitor network traffic and take screenshots of the infected system. What is it?
Câu 47: … simply monitors traffic, looking for suspicious activity that might indicate an attempted intrusion
Câu 48: This type of attack used to locating vulnerable wireless networks. What is this?
Câu 49: The simplest device for connecting computers is called what?
Câu 50: In Chapter 3, “Cyber Stalking, Fraud, and Abuse,” you were introduced to some fraud, ........., and related crimes