PT 9
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | show 🗑
|
||||
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive | show 🗑
|
||||
show | B. 989
E. 990
🗑
|
||||
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | show 🗑
|
||||
show | D. 22
🗑
|
||||
Which of the following answers refers to a port number assigned to the Kerberos authentication system? A. 49 B. 88 C. 1645 D. 1723 | show 🗑
|
||||
show |
🗑
|
||||
show | C. 636
🗑
|
||||
show | C. 5060
F. 5061
🗑
|
||||
Which of the ports listed below are used by RADIUS? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 | show 🗑
|
||||
show | A. 123
🗑
|
||||
show | A. 143
🗑
|
||||
An SNMP Agent receives requests on UDP port: A. 161 B. 137 C. 162 D. 138 | show 🗑
|
||||
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | show 🗑
|
||||
show | D. WPS attack
🗑
|
||||
show | D. False positive
🗑
|
||||
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | show 🗑
|
||||
show | C. 5060
F. 5061
🗑
|
||||
A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports needs to be opened to enable this type of connection? A. 443 B. 22 C. 143 D. 3389 | show 🗑
|
||||
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component | show 🗑
|
||||
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES | show 🗑
|
||||
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages | show 🗑
|
||||
show | D. arp -a
🗑
|
||||
Which cryptographic attack relies on the concepts of probability theory? A. Birthday B. KPA C. Dictionary D. Brute-force | show 🗑
|
||||
show | D. Sub-CA architecture
🗑
|
||||
Which of the attack types listed below relies on the amplification effect? A. Brute-force attack B. Zero-day attack C. MITM attack D. DDoS attack | show 🗑
|
||||
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR | show 🗑
|
||||
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? A. CBC B. GCM C. ECB D. CTR | show 🗑
|
||||
AES-based encryption mode implemented in WPA2 is known as: A. CCMP B. ECB C. CBC D. TKIP | show 🗑
|
||||
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B | show 🗑
|
||||
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) A. Code obfuscation B. Steganography C. SSID broadcast suppression D. Encryption E. Substitution ciphers | show 🗑
|
||||
show | A. Confusion
🗑
|
||||
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR | show 🗑
|
||||
show | B. ARP poisoning
🗑
|
||||
show | A. Cryptographic nonce
C. Salting
D. Initialization Vector (IV)
E. Shimming
🗑
|
||||
show | C. Data-in-use
🗑
|
||||
show | C. Gaining advantage over competitors
E. Passive reconnaissance in penetration testing
F. Preparation before launching a cyberattack
🗑
|
||||
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN | show 🗑
|
||||
show | C. /all
🗑
|
||||
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
bgray8