Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

PT 9

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2   show
🗑
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive   show
🗑
show B. 989 E. 990  
🗑
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20   show
🗑
show D. 22  
🗑
show B. 88  
🗑
show  
🗑
TACACS+ runs on TCP port: A. 389 B. 49 C. 636 D. 88   show
🗑
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061   show
🗑
show B. 1812 E. 1813  
🗑
Network Time Protocol (NTP) runs on UDP port: A. 123 B. 110 C. 161 D. 137   show
🗑
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? A. 143 B. 389 C. 443   show
🗑
show A. 161  
🗑
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2   show
🗑
show D. WPS attack  
🗑
show D. False positive  
🗑
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20   show
🗑
show C. 5060 F. 5061  
🗑
show A. 443  
🗑
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component   show
🗑
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES   show
🗑
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages   show
🗑
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? A. arp -e B. netstat -n C. nslookup D. arp -a   show
🗑
show A. Birthday  
🗑
show D. Sub-CA architecture  
🗑
show D. DDoS attack  
🗑
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR   show
🗑
show C. ECB  
🗑
show A. CCMP  
🗑
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B   show
🗑
show A. Code obfuscation B. Steganography C. SSID broadcast suppression E. Substitution ciphers  
🗑
show A. Confusion  
🗑
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR   show
🗑
show B. ARP poisoning  
🗑
show A. Cryptographic nonce C. Salting D. Initialization Vector (IV) E. Shimming  
🗑
Which of the three states of digital data requires data to be processed in an unencrypted form? A. Data-in-transit B. Data-at-rest C. Data-in-use   show
🗑
show C. Gaining advantage over competitors E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack  
🗑
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN   show
🗑
show C. /all  
🗑
show C. /all  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: bgray8