5 Questions
Which two statements are characteristics of a virus?
A virus can self-replicate and spread to other systems
What is a purpose of implementing VLANs on a network?
To prevent unauthorized access to the network
What is a characteristic of a Trojan horse as it relates to network security?
A Trojan horse disguises itself as a legitimate file or program
What technique is used in social engineering attacks?
Phishing
What addresses will identify frames containing data sent from PCA to PCB?
Src IP: 192.168.1.212, Src MAC: 00-60-0F-B1-33-33
Study Notes
Virus Characteristics
- A virus replicates itself by attaching to a host cell
- A virus requires a host cell to reproduce
VLANs Purpose
- Implementing VLANs on a network allows for the segregation of network traffic and improved network security
Trojan Horse Characteristics
- A Trojan horse appears to be a legitimate program, but actually hides malware or a virus
Social Engineering Techniques
- Social engineering attacks often use psychological manipulation to trick people into revealing sensitive information
Frame Addressing
- Frames containing data sent from PCA to PCB will be identified by the MAC addresses of PCA and PCB
Test your knowledge on CyberOps Associate (Version 1.0) with this quiz. Answer questions on virus characteristics, Trojan horses, social engineering attacks, VLAN implementation, and more.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free