Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

PT 9

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2   show
🗑
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive   show
🗑
show B. 989 E. 990  
🗑
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20   show
🗑
show D. 22  
🗑
Which of the following answers refers to a port number assigned to the Kerberos authentication system? A. 49 B. 88 C. 1645 D. 1723   show
🗑
show  
🗑
show C. 636  
🗑
show C. 5060 F. 5061  
🗑
Which of the ports listed below are used by RADIUS? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813   show
🗑
show A. 123  
🗑
show A. 143  
🗑
An SNMP Agent receives requests on UDP port: A. 161 B. 137 C. 162 D. 138   show
🗑
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2   show
🗑
show D. WPS attack  
🗑
show D. False positive  
🗑
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20   show
🗑
show C. 5060 F. 5061  
🗑
A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports needs to be opened to enable this type of connection? A. 443 B. 22 C. 143 D. 3389   show
🗑
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component   show
🗑
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES   show
🗑
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages   show
🗑
show D. arp -a  
🗑
Which cryptographic attack relies on the concepts of probability theory? A. Birthday B. KPA C. Dictionary D. Brute-force   show
🗑
show D. Sub-CA architecture  
🗑
Which of the attack types listed below relies on the amplification effect? A. Brute-force attack B. Zero-day attack C. MITM attack D. DDoS attack   show
🗑
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR   show
🗑
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? A. CBC B. GCM C. ECB D. CTR   show
🗑
AES-based encryption mode implemented in WPA2 is known as: A. CCMP B. ECB C. CBC D. TKIP   show
🗑
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B   show
🗑
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) A. Code obfuscation B. Steganography C. SSID broadcast suppression D. Encryption E. Substitution ciphers   show
🗑
show A. Confusion  
🗑
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR   show
🗑
show B. ARP poisoning  
🗑
show A. Cryptographic nonce C. Salting D. Initialization Vector (IV) E. Shimming  
🗑
show C. Data-in-use  
🗑
show C. Gaining advantage over competitors E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack  
🗑
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN   show
🗑
show C. /all  
🗑
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: bgray8