– Current Popular IT IV – T0693 Tugas Review

advertisement
Tugas Review – Current Popular IT IV – T0693
Module 12
11. Which two of the following are types of Dos attacks?
a. smurf
b. teardrop
c. wave
d. river
12. What term describes an immature individual that use scripts, software
programs, or techniques created by other, more skilled crackers?
a. Baby hacker
b. Script kiddies
c. Cracker kids
d. Child hacker
13. What program presents itself as another program to obtain information?
a. DoS
b. Masked hacker
c. Saint
d. Trojan horse
14. What is the most sophisticated type of internal security threat? Where theft
of trade secrets is big business, and companies can become overnight
successes or failures because of it?
a. Trojan horse
b. User ignorance
c. Corporate espionage
d. Spy programs
15. Which is NOT a third-party encryption programs are available on the
market?
a. PC Guardian
b. PC Protect
c. Deltacrypt
d. Winzap
Download