PT 9
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | show 🗑
|
||||
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive | show 🗑
|
||||
show | B. 989
E. 990
🗑
|
||||
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | show 🗑
|
||||
show | D. 22
🗑
|
||||
show | B. 88
🗑
|
||||
show |
🗑
|
||||
TACACS+ runs on TCP port: A. 389 B. 49 C. 636 D. 88 | show 🗑
|
||||
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061 | show 🗑
|
||||
show | B. 1812
E. 1813
🗑
|
||||
Network Time Protocol (NTP) runs on UDP port: A. 123 B. 110 C. 161 D. 137 | show 🗑
|
||||
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? A. 143 B. 389 C. 443 | show 🗑
|
||||
show | A. 161
🗑
|
||||
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | show 🗑
|
||||
show | D. WPS attack
🗑
|
||||
show | D. False positive
🗑
|
||||
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | show 🗑
|
||||
show | C. 5060
F. 5061
🗑
|
||||
show | A. 443
🗑
|
||||
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component | show 🗑
|
||||
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES | show 🗑
|
||||
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages | show 🗑
|
||||
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? A. arp -e B. netstat -n C. nslookup D. arp -a | show 🗑
|
||||
show | A. Birthday
🗑
|
||||
show | D. Sub-CA architecture
🗑
|
||||
show | D. DDoS attack
🗑
|
||||
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR | show 🗑
|
||||
show | C. ECB
🗑
|
||||
show | A. CCMP
🗑
|
||||
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B | show 🗑
|
||||
show | A. Code obfuscation
B. Steganography
C. SSID broadcast suppression
E. Substitution ciphers
🗑
|
||||
show | A. Confusion
🗑
|
||||
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR | show 🗑
|
||||
show | B. ARP poisoning
🗑
|
||||
show | A. Cryptographic nonce
C. Salting
D. Initialization Vector (IV)
E. Shimming
🗑
|
||||
Which of the three states of digital data requires data to be processed in an unencrypted form? A. Data-in-transit B. Data-at-rest C. Data-in-use | show 🗑
|
||||
show | C. Gaining advantage over competitors
E. Passive reconnaissance in penetration testing
F. Preparation before launching a cyberattack
🗑
|
||||
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN | show 🗑
|
||||
show | C. /all
🗑
|
||||
show | C. /all
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
bgray8