B. CD-RW
C. CD-R
D. DVD-R
Answer: A
Hyper-V is a server application that enables users to run a broad range of operating systems simultaneously on a single physical server. Hyper-V is included with some versions of Windows Server 2008. Hyper-V can be run only on a 64-bit version of Windows Server 2008 that is running on 64-bit hardware.
Spam generally refers to unwanted commercial e-mail that is typically sent in bulk to thousands or even millions of recipients. There are some gray areas that we hope won’t trip you up: Some people may include the e-mail produced by mass-mailing viruses or Trojan horses as spam. Similarly, some people may include e-mail from a company they have done business with as spam. Also, if you subscribe to some e-mail list and at some time in the future you no longer want it, that might be spam.
Here are some tips to ensure malware is not given access to your computer:
Keep your computer up to date.
Keep your browser up to date.
Install good antimalware.
Download free software only from sites you know and trust.
Avoid clicking links inside pop-up windows.
Keep Your Computer up to Date
To keep Windows up to date, Microsoft uses Windows Update. Windows Update should run automatically on your PC. However, you should check if your PC is up to date. To check for Windows updates:
1. Click Start, Run, and type:
a. WindowsXP:wupdmgr
b. Windows Vista/7: wuapp
2. PressEnter.
3. Click Install Updates
You may need to download the Windows Genuine Advantage (WGA) tool, which checks to see if your copy of Windows is genuine.
Windows may need to reboot your machine several times as new updates are installed.
Your computer is now up to date.
Keep Your Browser up to Date
Browsers are a common source of computer vulnerabilities because they use so many plugins and programs that create loop holes that malware can exploit. To update your browser:
Internet Explorer
If you are using Internet Explorer (IE) as your browser, use Windows Update—explained above—to keep it up to date.
Mozilla Firefox
To check for updates for Mozilla Firefox:
1. Open Firefox.
2. Click Help > Check for Updates.
3. If updates are available, follow the on-screen instructions.
Software designed to remove or block malware (e.g. AVG Internet Security, Avast, ESET Smart Security etc.)
Good antimalware programs scan files in real time; as you download, copy, and install files on to your computer, your antimalware program will scan these files for infections and malicious code. You should only have one real- time scanner installed at any time—otherwise they will conflict as they compete to scan the same files
Comes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.
Key loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard.
Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware.
Spyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.)
A formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware.
A. Go through the rubbish to find out any information that might have been discarded.
B. Search on financial site such as Yahoo Financial to identify assets.
C. Scan the range of IP address found in the target DNS database.
D. Perform multiples queries using a search engine.
Answer: C
Explanation: Passive footprinting is a method in which the attacker never makes contact with the target systems. Scanning the range of IP addresses found in the target DNS is considered making contact to the systems behind the IP addresses that is targeted by the scan.
A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC.
A computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers.
A. Visit google's search engine and view the cached copy.
B. Visit Archive.org web site to retrieve the Internet archive of the company's website.
C. Crawl the entire website and store them into your computer.
D. Visit the company's partners and customers website for this information.
Answer: B
Explanation: Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the websiteis incorrect because that's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org
What are the two basic types of attacks?(Choose two.)
A. DoS
B. Passive
C. Sniffing
D. Active
E. Cracking
Answer: B, D
Explanation: Passive and active attacks are the two basic types of attacks.
A. A person whohacksfor ethical reasons
B. A person whohacksfor an ethical cause
C. A person whohacksfor defensive purposes
D. A person whohacksfor offensive purposes
Answer: C
Explanation: The Ethical hacker is a security professional who applies his hacking skills for defensive purposes.
A. Hacking for a cause
B. Hacking ruthlessly
C. An association which groups activists
D. None of the above
Answer: A
Explanation: The term was coined by author/critic Jason Logan Bill Sack in an article about media artist Shu Lea Cheang. Acts of hacktivism are carried out in the belief that proper use of code will have leveraged effects similar to regular activism or civil disobedience.
A. Someone who is hacking for ethical reasons.
B. Someone who is using his/her skills for ethical reasons.
C. Someone who is using his/her skills for defensive purposes.
D. Someone who is using his/her skills for offensive purposes.
Answer: C
Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills.
What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?
A. The ethical hacker does not use the same techniques or skills as a cracker.
B. The ethical hacker does it strictly for financial motives unlike a cracker.
C. The ethical hacker has authorization from the owner of the target.
D. The ethical hacker is just a cracker who is getting paid.
Answer: C
Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target.