christ please help me with this.
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
T/F: Different types of organizations have similar levels of network security risks. | show 🗑
|
||||
show | True
🗑
|
||||
T/F: A hacker, in the original sense of the word, is someone with technical skill and malicious intent. | show 🗑
|
||||
T/F: The day after Patch Tuesday is informally dubbed Exploit Wednesday. | show 🗑
|
||||
show | True
🗑
|
||||
show | True
🗑
|
||||
T/F: The original version of the Secure Hash Algorithm was developed by MIT. | show 🗑
|
||||
T/F: Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection. | show 🗑
|
||||
T/F: Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered. | show 🗑
|
||||
T/F: It is ideal to use the same password for multiple different applications, provided the password is complex enough. | show 🗑
|
||||
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes? | show 🗑
|
||||
show | Polymorphic malware can change its characteristics every time it is transferred to a new system.
🗑
|
||||
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware? | show 🗑
|
||||
show | A program that runs independently of other software and travels between computers and across networks.
🗑
|
||||
show | honeynet
🗑
|
||||
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack? | show 🗑
|
||||
Which of the following scenarios represents a phishing attempt? | show 🗑
|
||||
In a red team-blue team exercise, what is the purpose of the blue team? | show 🗑
|
||||
show | Nessus
🗑
|
||||
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place? | show 🗑
|
||||
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this? | show 🗑
|
||||
In the typical social engineering attack cycle, what occurs at Phase 3? | show 🗑
|
||||
show | principle of least privilege
🗑
|
||||
show | A denial-of-service attack prevents legitimate users from accessing normal network resources.
🗑
|
||||
show | DNS poisoning
🗑
|
||||
show | It is a port scanning utility that can identify open ports on a host.
🗑
|
||||
show | A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
🗑
|
||||
What type of door access control is a physical or electronic lock that requires a code in order to open the door? | show 🗑
|
||||
An RFID label on a box is an example of what type of physical security detection method? | show 🗑
|
||||
What statement regarding the different versions of the SHA hashing algorithm is accurate? | show 🗑
|
||||
show | sha256sum
🗑
|
||||
show | Get-FileHash
🗑
|
||||
show | mobile device management software
🗑
|
||||
A variant of BYOD, what does CYOD allow employees or students to do? | show 🗑
|
||||
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found? | show 🗑
|
||||
show | Your company needs to prevent a new contractor from sharing information with a potential competitor.
🗑
|
||||
How often should you require users to change their passwords? | show 🗑
|
||||
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS? | show 🗑
|
||||
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target? | show 🗑
|
||||
show | True
🗑
|
||||
T/F: A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection. | show 🗑
|
||||
T/F: The Spanning Tree Protocol operates at the Network layer of the OSI model. | show 🗑
|
||||
T/F: The storm-control command is a type of flood guard that is available on most major network switch vendor platforms. | show 🗑
|
||||
show | True
🗑
|
||||
T/F: Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options. | show 🗑
|
||||
T/F: By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos. | show 🗑
|
||||
T/F: When utilizing Kerberos, an access granting ticket is the same as a key. | show 🗑
|
||||
T/F: The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop. | show 🗑
|
||||
show | True
🗑
|
||||
show | Squid
🗑
|
||||
show | The operating system used by the source or destination device.
🗑
|
||||
show | 255.255.255.255
🗑
|
||||
What kind of firewall can block designated types of traffic based on application data contained within packets? | show 🗑
|
||||
show | iptables
🗑
|
||||
show | It is a system used to evaluate data from security devices and generate alerts.
🗑
|
||||
show | STP must first select the root bridge, or master bridge.
🗑
|
||||
show | BPDU guard
🗑
|
||||
Which protocol designed to replace STP operates at Layer 3 of the OSI model? | show 🗑
|
||||
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use? | show 🗑
|
||||
show | geofencing
🗑
|
||||
show | It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
🗑
|
||||
Which legacy authentication protocol requires mutual authentication? | show 🗑
|
||||
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer? | show 🗑
|
||||
show | Protected EAP (PEAP)
🗑
|
||||
show | 802.11i
🗑
|
||||
show | Rapid Spanning Tree Protocol (RSTP)
🗑
|
||||
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished? | show 🗑
|
||||
What aspect of AAA is responsible for determining what a user can and cannot do with network resources? | show 🗑
|
||||
What statement regarding role-based access control is accurate? | show 🗑
|
||||
Which encryption standard was originally utilized with WPA's TKIP? | show 🗑
|
||||
show | It used a shared encryption key for all clients, and the key might never change.
🗑
|
||||
show | The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
🗑
|
||||
show | gpedit.msc
🗑
|
||||
show | Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
🗑
|
||||
show | port mirroring
🗑
|
||||
show | Local authentication is network and server failure tolerant.
🗑
|
||||
show | You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
🗑
|
||||
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change? | show 🗑
|
||||
show | A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
TheGoldenCPU
Popular Computers sets