thumbnail

Đề Thi Trắc Nghiệm Môn Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin EPU - Đại Học Điện Lực - Miễn Phí Có Đáp Án

Tổng hợp đề thi trắc nghiệm môn Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin, được thiết kế phù hợp với chương trình học tại Đại học Điện Lực (EPU). Đề thi bao gồm các nội dung trọng tâm như từ vựng, thuật ngữ chuyên ngành và kỹ năng đọc hiểu tài liệu liên quan đến an ninh mạng và bảo mật thông tin. Tài liệu miễn phí kèm đáp án chi tiết, hỗ trợ sinh viên ôn tập hiệu quả và chuẩn bị tốt nhất cho kỳ thi.

Từ khoá: đề thi trắc nghiệm Tiếng Anh Chuyên Ngành Bảo Mật Thông Tin EPU Đại học Điện Lực ôn tập tiếng Anh chuyên ngành học bảo mật thông tin kiểm tra kiến thức đề thi miễn phí tài liệu an ninh mạng đáp án chi tiết

Số câu hỏi: 631 câuSố mã đề: 13 đềThời gian: 1 giờ

91,594 lượt xem 7,041 lượt làm bài


Chọn mã đề:


Bạn chưa làm Mã đề 1!!!

 

Xem trước nội dung:

Câu 1: 0.2 điểm
Vince Cerf invented what?
A.  
The World Wide Web
B.  
Email
C.  
TCP
D.  
The first computer virus
Câu 2: 0.2 điểm
The first computer incident-response team is affiliated with what university?
A.  
Massachusetts Institute of Technology
B.  
Carnegie-Mellon University
C.  
Harvard University
D.  
California Technical University
Câu 3: 0.2 điểm
Which of the following is a vulnerability scanner specifically for Windows systems?
A.  
Nmap.
B.  
OphCrack.
C.  
Nessus.
Câu 4: 0.2 điểm
… is embedded in some web pages, and when a user visits those web pages, she is given a fake virus scan that tells her she has a virus and it needs to be fixed. The “fix” is actually downloading a virus.
A.  
CryptoLocker
B.  
MacDefender
C.  
Rombertik
D.  
Troj/Invo-Zip
Câu 5: 0.2 điểm
This is any attack that attempts to breach your website
A.  
Session hijacking
B.  
Insider threats
C.  
Web attacks
D.  
DNS poisoning
Câu 6: 0.2 điểm
A workload for a computer system may be defined by the number of simultaneous users, the size of files, the speed of data.........., or the amount of data stored.
A.  
transmitter
B.  
transmission
C.  
transition
D.  
transitive
Câu 7: 0.2 điểm
In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
A.  
some
B.  
one
C.  
every
D.  
Almost
Câu 8: 0.2 điểm
Which of the following is not a valid IP address?
A.  
127.0.0.1
B.  
295.253.254.01
C.  
127.256.5.2
D.  
245.200.11.1
Câu 9: 0.2 điểm
What kind of connection type has 64 Kbps speed?
A.  
DS0
B.  
T1
C.  
T3
D.  
ISDN
Câu 10: 0.2 điểm
What kind of cable has speed up to 20MHz/100Mbps and uses for Data lines, Ethernet networks?
A.  
Category 3
B.  
Category 4
C.  
Category 1
D.  
Category 6a
Câu 11: 0.2 điểm
The most common place to encounter a firewall is … your network and the outside world.
A.  
below
B.  
above
C.  
between
Câu 12: 0.2 điểm
It is a fairly typical virus in that it spreads primarily through email, but it also uses file sharing utilities to copy itself. It copies itself to various directories and shared folders. In one interesting twist, it attempts to copy itself to C:\WINDOWS\FVProtect.exe. The name would make many people (including otherwise technically savvy people) think this program was actually part of some antivirus utility. It also copies itself to C:\WINDOWS\userconfig9x.dll. Again, it would appear to be a system file, thus making people less likely to delete it. What is it?
A.  
CryptoLocker
B.  
MacDefender
C.  
W32/Netsky-P
D.  
Troj/Invo-Zip
Câu 13: 0.2 điểm
What kind of connection type has 1.54 Mbps speed?
A.  
ISDN
B.  
T1
C.  
T3
D.  
OC3
Câu 14: 0.2 điểm
What is the malware?
A.  
a generic term for software that has a malicious purpose
B.  
an antivirus security software for computer
C.  
unknown software which steal user information
D.  
software which protect computer system
Câu 15: 0.2 điểm
Some well-known Trojan horses such as the 2nd Thought application that downloads to a person’s PC and then blasts it with ...
A.  
advertising
B.  
advertisements
C.  
dverse
Câu 16: 0.2 điểm
If you wish to view items that have been removed from a website, what is the best way to do that?
A.  
Use Nessus
B.  
Use Nmap
C.  
Use www.archive.org
Câu 17: 0.2 điểm
A Vietnamese name of a router is…
A.  
Bộ định tuyến
B.  

Bộ chia mạng

C.  

Bộ phát tín hiệu

D.  

Thiết bị kết nối

Câu 18: 0.2 điểm

The first computer incident-response team is affiliated with what university?

A.  
Massachusetts Institute of Technology
B.  
Carnegie-Mellon University
C.  
Harvard University
D.  
California Technical University
Câu 19: 0.2 điểm
Which of the following is a major resource for detailed information on a computer virus?
A.  
The MIT Virus Library
B.  
The Microsoft Virus Library
C.  
The F-Secure Virus Library
D.  
The National Virus Repository
Câu 20: 0.2 điểm
What is war-driving?
A.  
Driving and seeking a computer job
B.  
Driving while using a wireless connection to hack
C.  
Driving looking for wireless networks to hack
D.  
Driving and seeking rival hackers
Câu 21: 0.2 điểm
Another new type of virus has been gaining popularity in the past few years, and that is the “… virus” or, put simply, a hoax. Rather than actually writing a virus, a hacker sends an email to every address he has. The email claims to be from some well-known antivirus center and warns of a new virus that is circulating. The email instructs people to delete some file from their computer to get rid of the virus. The file, however, is not really a virus but part of a computer’s system.
A.  
Nonvirus
B.  
Bagle
C.  
Gameover ZeuS
D.  
Sobig
Câu 22: 0.2 điểm
A more advanced form of a polymorphic virus is called the … virus; it can completely change itself.
A.  
file infector
B.  
boot sector
C.  
macro
D.  
metamorphic
Câu 23: 0.2 điểm
What class would the IP address of 193.44.34.12 be?
A.  
A
B.  
B
C.  
C
D.  
D
Câu 24: 0.2 điểm
Which layer of the OSI model is divided into two sublayers?
A.  
Data link
B.  
Network
C.  
Presentation
D.  
Session
Câu 25: 0.2 điểm
DoS attack does not even ............to intrude on your system or to obtain sensitive information;
A.  
attempt
B.  
attemptly
C.  
attempted
Câu 26: 0.2 điểm
What common tools used for Dos mentioned in “Computer Security Fundamentals”?
A.  
TNF and Stacheldrahts
B.  
TFN and Stacheldraht
C.  
FTN and Stacheldrahd
D.  
NTF and Stacheldragh
Câu 27: 0.2 điểm
What can you do with a firewall to help protect against virus attacks?
A.  
Close all incoming ports.
B.  
None of the above.
C.  
Shut down all unneeded ports.
Câu 28: 0.2 điểm
What kind of connection type has 128 Kbps speed?
A.  
ISDN
B.  
T1
C.  
T3
D.  
OC3
Câu 29: 0.2 điểm
In the case of Sobig, if one person on a network was unfortunate enough to open an email containing the virus, not only would his machine be infected, but so would … shared drive on that network to which this person had access.
A.  
some
B.  
one
C.  
every
D.  
Almost
Câu 30: 0.2 điểm
An intrusion detection system is an example of which of the following?
A.  
Proactive security
B.  
Perimeter security
C.  
Hybrid security
D.  
Good security practices
Câu 31: 0.2 điểm
Mimail had its own built-in …, so it did not have to “piggy back” off your email client
A.  
inbox
B.  
drafts
C.  
email engine
D.  
snoozed
Câu 32: 0.2 điểm
What is SAM?
A.  
Security Accounts Manager
B.  
Service Access Manager
C.  
Service Accounts Media
Câu 33: 0.2 điểm
This “mail reader” program is made by Mozilla Foundation. What is it?
A.  
Postbox
B.  
Outlook
C.  
Mailspring
D.  
Thunderbird
Câu 34: 0.2 điểm
Which of the following is not one of the three major classes of threats?
A.  
Attempts to intrude on the system
B.  
Online auction fraud
C.  
Denial of service attacks
D.  
A computer virus
Câu 35: 0.2 điểm
The name comes from the fact that the Internet is full of utilities and scripts that one can download to perform some hacking tasks. Many of these tools have an easy-to use graphical user interface that allows someone with very little if any skill to operate the tool. A classic example is the Low Earth Orbit Ion Cannon tool for executing a DoS attack. Someone who downloads such a tool without really understanding the target system is considered a script kiddy. A significant number of the people you are likely to encounter who call themselves hackers are, in reality, mere ...
A.  
script kiddies
B.  
phreaking
C.  
ethical hacking
D.  
DoS attack
Câu 36: 0.2 điểm
What is abbreviation of DoS?
A.  
disk operating system
B.  
denial of service
C.  
distributed denial of service
D.  
deal of service
Câu 37: 0.2 điểm
This particular piece of spyware (the 2nd Thought application) is one that downloads to your PC when you visit certain websites. It is benign in that it causes no direct harm to your system or files, nor does it gather sensitive information from your PC. However, it is incredibly annoying as it inundates your machine with unwanted ...
A.  
scripts
B.  
ads
C.  
files
Câu 38: 0.2 điểm
What port does FTP use?
A.  
20 and 21
B.  

22

C.  

23

D.  

25

Câu 39: 0.2 điểm
It includes virus attacks, worms, adware, Trojan horses, and spyware. What is it
A.  
DoS attacks
B.  
Symantec
C.  
DNS poisoning
D.  
Malware
Câu 40: 0.2 điểm
What web server service can you use that mentions Computer Security Fundamentals?
A.  
Window7/8/8.1/10
B.  
Apache, IIS, or any web server
C.  
vFabric Web Server 5.1.1
D.  
All answers are correct
Câu 41: 0.2 điểm
What is spyware?
A.  
Any software that monitors your system
B.  
Only software that logs keystrokes
C.  
Any software used to gather intelligence
D.  
Only software that monitors what websites you visit
Câu 42: 0.2 điểm
A virus will usually spread primarily in one of two ways. The first is to simply … your computer for connections to a network and then … itself to other machines on the network to which your computer has access. This is actually the most efficient way for a virus to spread.
A.  
scan / copy
B.  
find / replicate
C.  
attack / harm
Câu 43: 0.2 điểm
What other way can a virus scanner work?
A.  
By blocking files that copy themselves.
B.  
By blocking all unknown files.
C.  
By looking at files for virus-like behavior.
Câu 44: 0.2 điểm
Compare bit and bytes
A.  
1 byte = 8 bits
B.  

1 byte = 32 bits

C.  

8 byte = 1 bits

D.  

1 byte = 4 bits

Câu 45: 0.2 điểm
A T1 line sends data at what speed?
A.  
100Mbps
B.  
1.54Mbps
C.  
155Mbps
D.  
56.6Kbps
Câu 46: 0.2 điểm
This virus, which first appeared in 2012, targeted Windows operating systems. The first item that makes this virus notable is that it was specifically designed by the U.S. government for espionage. It was discovered in May 2012 at several locations, including Iranian government sites. It is spyware that can monitor network traffic and take screenshots of the infected system. What is it?
A.  
The Bagle virus
B.  
Flame
C.  
The Mimail virus
D.  
A Nonvirus virus
Câu 47: 0.2 điểm
… simply monitors traffic, looking for suspicious activity that might indicate an attempted intrusion
A.  
An IPS
B.  
A firewall
C.  
An IDS
D.  
A proxy
Câu 48: 0.2 điểm
This type of attack used to locating vulnerable wireless networks. What is this?
A.  
war-driving
B.  
war-dialing
C.  
war-dying
D.  
war-flying
Câu 49: 0.2 điểm
The simplest device for connecting computers is called what?
A.  
NIC
B.  
Interface
C.  
Hub
D.  
Router
Câu 50: 0.2 điểm
In Chapter 3, “Cyber Stalking, Fraud, and Abuse,” you were introduced to some fraud, ........., and related crimes
A.  
stalker
B.  
stalking
C.  
Stalked

Đề thi tương tự

Đề Thi Trắc Nghiệm Môn Tiếng Anh Chuyên Ngành Marketing - Có Đáp Án - Học Viện Tài ChínhĐại học - Cao đẳngTiếng Anh

1 mã đề 25 câu hỏi 30 phút

86,4286,638

Đề Thi Trắc Nghiệm Môn Tiếng Anh Chuyên Ngành – Đại Học Điện Lực (Miễn Phí, Có Đáp Án)Đại học - Cao đẳngTiếng Anh

3 mã đề 127 câu hỏi 1 giờ

38,9532,987

Đề Thi Trắc Nghiệm Môn Tiếng Anh Chuyên Ngành Đại Học Điện Lực - Có Đáp Án Chi TiếtĐại học - Cao đẳngTiếng Anh

2 mã đề 50 câu hỏi 1 giờ

79,8676,137