CIS 206 Week 6 Quiz | Assignment Help | Devry University
- Devry University / CIS 206
- 06 Apr 2019
- Price: $5
- Other / Other
CIS 206 Week 6 Quiz | Assignment Help | Devry University
Question 1
(CO 6) One of the steps a cracker
does to hide his or her intrusion is to edit the various log files in /var.log.
As the system admin, what can you do to prevent this?
Question 2
(CO 6) A Trojan horse _____.
Question 3
(CO 6) The protocols used to encrypt
account names and passwords are called _____ protocols.
Question 4
(CO 6) An employee for a company
inadvertently allows a visitor to see his username and password as he logs into
the company computer network. At home, the visitor then uses this information
to gain access to the company network. This is an example of what type of
threat?
Question 5
(CO 6) What type of unsolicited
Internet message records the URLs visited and keystrokes used?
Question 6
(CO 6) What is a simple wireless
configuration technique that can make the network invisible to unauthorized
users?
Question 7
(CO 6) Which method can a technician
use to make sure that only specific computers connect to a wireless router?
Question 8
(CO 6) Which threat to security uses
traffic from zombie computers to overwhelm servers?
Question 9
(CO 6) What types of variables can
be used in a shell script?
Question 10
(CO 6) You want to review all failed login
attempts on the system in the /car/log/btmp binary file. Which of the
following commands should you use?