CIS 206 Week 6 Quiz | Assignment Help | Devry University

CIS 206 Week 6 Quiz | Assignment Help | Devry University 


Question 1

 

(CO 6) One of the steps a cracker does to hide his or her intrusion is to edit the various log files in /var.log. As the system admin, what can you do to prevent this?

 

Question 2

 

(CO 6) A Trojan horse _____.

 

Question 3

 

(CO 6) The protocols used to encrypt account names and passwords are called _____ protocols.

 

Question 4

 

(CO 6) An employee for a company inadvertently allows a visitor to see his username and password as he logs into the company computer network. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?

 

Question 5

 

(CO 6) What type of unsolicited Internet message records the URLs visited and keystrokes used?

 

 

Question 6

 

(CO 6) What is a simple wireless configuration technique that can make the network invisible to unauthorized users?

 

Question 7

 

(CO 6) Which method can a technician use to make sure that only specific computers connect to a wireless router?

 

 

Question 8

 

(CO 6) Which threat to security uses traffic from zombie computers to overwhelm servers?

 

Question 9

 

(CO 6) What types of variables can be used in a shell script?

 

 

 

Question 10

 (CO 6) You want to review all failed login attempts on the system in the /car/log/btmp binary file.  Which of the following commands should you use?

 

 

Answer Detail

Get This Answer

Invite Tutor