System Administrator 2026
Which of the following is not a characteristic of a virus?
  • A. Virus destroy and modify user data
  • B. Virus is a standalone program
  • C. Virus is a code embedded in a legitimate program
  • D. Virus cannot be detected
What is known as masquerading?
  • A. When one participant in communication pretends to be someone else
  • B. When attacker modifies data in communication
  • C. When attack is of fraudulent repeat of a valid data
  • D. When attack gains access to remote systems
Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
  • A. Robert morris
  • B. Bob milano
  • C. Mark zuckerberg
  • D. Bill gates
What is port scanning?
  • A. It is a software used to scan system for attack
  • B. It is a software application designed to probe a server or host for open ports
  • C. It is software used to scan system for introducing attacks by brute force
  • D. None of the mentioned
Which is not a port scan type?
  • A. Tcp scanning
  • B. Syn scanning
  • C. Udp scanning
  • D. System scanning
Which is not a valid port scan type?
  • A. Ack scanning
  • B. Window scanning
  • C. Igmp scan
  • D. Fin scanning
What are zombie systems?
  • A. Are specific system which are designed to attack by manufacturer
  • B. They are network of known hacking group
  • C. These systems are previously compromised independent systems
  • D. None of the mentioned
What is known as a DOS attack?
  • A. It is attacked to block traffic of network
  • B. It is attacked to harm contents stored in hdd by worm spawn processes
  • C. It is an attempt to make a machine or network resource unavailable
  • D. None of the mentioned
With regard to DOS attack what is not true from below options?
  • A. We can stop dos attack completely
  • B. By upgrading os vulnerability we can stop dos attack to some extent
  • C. Dos attack has to be stopped at network level
  • D. Such attack can last for hours
What is not an important part of security protection?
  • A. Large amount of ram to support antivirus
  • B. Strong passwords
  • C. Audit log periodically
  • D. Scan for unauthorized programs in system directories