ITN206 QUIZ

  1. A Bluetooth piconet is an example of what type of network topology  ad hoc topology
  2. A client PC on your company’s network is attempting to browse to a vendor’s web page on the Internet, but the computer goes to a malicious web page instead. What two utilities can you use to verify that the DNS records are correct for the web page? (Choose two.)  dignslookup
  3. A Digital signature is a piece of data digest encrypted with:  The private key of the sender
  4. A framework for all of the entities involved in digital certificates for digital certificate management is known as:  Public key infrastructure
  5. A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. It prevents targeted attacks that include Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input. In which of the following attacks does the attacker gains access to a restricted page within a Web application by supplying a URL directly?  Forceful browsing
  6. Anetwork administrator is evaluating different firewalls. Which of the following firewalls provides protection from the following attacks: Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input?  Web application firewall (WAF)
  7. By creating a starting point for comparison purposes in order to apply targets and goals to measure success, what are you doing   Establishing a baseline.
  8. Choose the SQL injection statement example below that could be used to find specific users:  whatever’ OR full_name LIKE ‘%Mia%’
  9. Cryptography is often used to make a message unreadable. _________ is used to physically hide a message.  Steganography
  10. Digital files all contain hidden information used to describe the content and structure. This information is called _________?   Metadata
  11. Hashing aims to produce:   A fixed-size string
  12. How does a buffer overflow attack occur?  A buffer overflow attack occurs when an attacker sets up a process to overflow data in the target machines RAM that will fill the memory past its buffered capacity. This extra information flows into other memory locations (i.e. virtual memory). Thus, the attacker is able to interrupt the current program’s instructions, overflow/redirect the return address, and point that process towards his/her own malware.
  13. How does a cross-site scripting (XSS) attack work?   In a cross-site scripting (XSS) attack, the threat actor uses the web applications that accept user input without validating it before presenting it back to the user. Thus, the attacker can use this vulnerability by tricking a valid (non-validating) website to feed a malicious script to the user’s browser which will execute the script.
  14. How does a distributed denial of service attack differ from a regular denial of service attack  DDoS attacks utilize many computers for making bogus requests, instead of just one.
  15. In Active Directory, what does authorization?  LDAP
  16. In what type of security policy might you define the required minimal security configuration for servers on the network  server security policy
  17. MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?   128
  18. Of the two encryption modes supported by IPsec, what mode is more secure, and why  Tunnel mode, because the header and data portion of the packet are encrypted
  19. Once the malware reaches a system through circulation, then it must embed itself into that system.  TRUE
  20. Packet sniffing can be helpful in detecting rogues.  True
  21. Per your company’s data destruction policy, you have been tasked with the destruction of data on a magnetic hard drive. The policy employed by your company specifies that you must destroy the drive by reducing or eliminating the magnetic fields present in the drive. What method should you use   You should perform a degaussing procedure on the drive
  22. Providing the minimum amount of privileges necessary to perform a job or function is known as what security principle  least privilege
  23. Proxies are “devices” that are strictly software-only.  FALSE
  24. RIPEMD (RIPE Message Digest) is a suite of cryptographic hash functions developed basing upon:  MD4 – Message-Digest Algorithm
  25. SSL v3.0 served as the basis for TLS v1.0.  True
  26. Steganography takes the data it is protecting and hides it within a file. The process can utilize many areas of the file. Which of the choices shown is NOT used?  File name
  27. The Authentication Header (AH) protocol is a part of what encryption protocol suite below?  IPSec
  28. The exchange of information among DNS servers regarding configured zones is known as:  zone transfer
  29. The security administrator for Conglomerate.com has been directed by the CIO to reduce the cost of certificates. Which of the following is the FIRST step that should be taken?  Install a CA
  30. The Steganography message is called the ___________?  Plaintext
  31. To achieve server scalability, more servers may be added to a configuration and make use of:   load balancers
  32. To increase fault-tolerance, the security administrator for Corp.com has installed an active/passive firewall cluster where the second firewall is held in reserve in case of primary firewall failure. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem?   Inbound packets are traversing the active firewall and return traffic is being sent through the passive firewall.
  33. What are the three areas of protection provided by IPSEC?  Three areas of protection provided by IPSEC are:
    Authentication – IPSEC authenticates the packets received were the original packets that were sent from the source.
    Confidentiality – IPSEC encrypts the packets so no third parties could view the information.
    Key management – IPSEC manages the keys to ensure they are not intercepted.              
  34. What are the two different types of one-time password that can be created? (Choose two.)  HMAC based one-time password (HOTP)time-based one time password (TOTP)
  35. What are two items that are specifically part of the Secure DevOps methodology? (Choose two.) continuous integrationsecurity automation
  36. What attack involves impersonating another device?  Spoofing
  37. What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the next plaintext block?  Cipher Block Chaining (CBC)
  38. What can be deployed to intercept and log network traffic passing through the network?  protocol analyzers
  39. What common method is used to ensure the security and integrity of a root CA?  Keep it in an offline state from the network
  40. What DNS vulnerability can be specifically addressed by utilizing Domain Name System Security Extensions (DNSSEC)  DNS poisoning
  41. What does a component’s mean time between failures (MTBF) value determine?  It refers to the average amount of time until a component fails and cannot be repaired.
  42. What encryption protocol is used for the WPA2 wireless standard  Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
  43. What feature of a mobile device management system could be used to restrict the use of an application containing confidential data to only a specific geographical area?  Geofencing
  44. What hardware based solutions are measures for fault tolerance? (Choose all that apply.)  Clustering
    RAID
    Load Balancing
  45. What is NOT an advantage of using job rotation in a complex business environment  It reduces job training costs by ensuring everyone knows how to do everyone else’s job
  46. What is PBKDF2 (Password-Based Key Derivation Function 2) for?  Hashing passwords for storage
  47. What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?  OCSP
  48. What is the most secure form of IEEE 802.1x authentication  certificate based
  49. What is the S/MIME protocol used for?  MIME is a standard for organizing electronic messages. So, the S/MIME protocol is used to secure email messages. It also allows users to send encrypted messages that are digitally signed.
  50. What is used to create session keys?   master secret                             
  51. What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?   web server
  52. What language below is used to view and manipulate data that is stored in a relational database?  SQL
  53. What process will remove all private and public keys along with the user’s identification information in the CA?  destruction
  54. What specific type of phishing attack uses the telephone to target a victim?  Vishing
  55. What specific ways can a session token be transmitted? (Choose all that apply.)  In the URL.
    In the header of the HTTP requisition.
  56. What statement accurately defines what a race condition is and how it might affect a computer?  A race condition occurs when concurrent threads of execution access a shared resource simultaneously, producing unintended consequences.
  57. What statement correctly defines what a rainbow table is in relation to password attacks   A rainbow table is a compressed representation of cleartext passwords that are related and organized in a sequence.
  58. What statement describes the Privacy Enhancement Mail (PEM) X.509 format?  It is designed to provide confidentiality and integrity to emails utilizing DER encoding.
  59. What two statements describe methods that can be employed by armored viruses in order to avoid detection? (Choose two.)  Armored viruses can use encrypted code pieces to assemble itself with the help of an infected program.Armored viruses may mutate or change their code on the fly to avoid detection.
  60. What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?  ARP poisoning
  61. What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?  watering hole
  62. What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?  Logic bomb
  63. What type of cryptography provides security comparable to asymmetric encryption with significantly reduced computational power and with smaller key sizes   elliptic curve cryptography
  64. What type of malware specializes in avoiding detection by accessing lower layers of the operating system or by using undocumented functions to make alterations  rootkit
  65. What type of ransomware displays a screen and prevents the user from accessing the computer’s resources?  blocker ransomware
  66. What type of software can be installed in an individual’s web browser to prevent ads from displaying?  ad blocking
  67. What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard?   Keylogger
  68. What type of trust model is used as the basis for most digital certificates used on the Internet?  distributed trust
  69. What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?  Easter egg
  70. When dealing with the preservation of evidence, who should be responsible for processing the evidence?  Properly trained computer evidence specialists
  71. When deploying sensors, collectors, and filters, where should they be placed in the network?  They should be placed where the stream of data is largest.
  72. When evaluating risk response techniques, which of the terms would best identify the attempt to make the risk less serious?   Mitigate
  73. When evaluating risk response techniques, which of the terms would best identify the act of purchasing insurance for an asset?   Transfer
  74. When using application-based firewalls, what is NOT capable of being used to identify an application being used   IP addresses
  75. When using OAuth, how are a user’s username and password received by a third party server.   The username and password are replaced by a an authentication token, which is then used to gain access to the third party server.
  76. When using steganography to hide a message you can increase the protection of a message by using cryptography to encrypt the message. Examine the choices provided and select the one that describes encrypted information.   Ciphertext
  77. When you are configuring password policy settings in Group Policy, what is the recommended setting for password reuse  24 new passwords must be used before a reused password
  78. Which attack method can be executed by someone with little or no computer or network knolege?  Open-source intelligence
  79. Which malware type would be used to infect cloud based storage?  Crypto-malware
  80. Which of the choices identifies the actions of a rootkit?  Becomes undetectable
  81. Which of the choices is NOT a trait of crypt-malware?   Collects private information
  82. Which of the choices shown are NOT true when considering virus behavior?  Requires human actions to execute
  83. Which of the following are considered to be interception attacks? (Choose all that apply.)       man-in-the-middle
    replay attacks
  84. Which of the following are measures for achieving availability? (Choose all that apply.)  Redundancy, Fault tolerance, and Patching
  85. Which of the following are options that are viable and practical for implementing data encryption? (Choose all that apply.)  Full disk encryption, database encryption, individual file encryption, removable media encryption, and mobile devices encryption.
  86. Which of the following is NOT a means used by an attacker to do reconnaissance on a network?  Smurf attack
  87. Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?  Source
  88. Which of the following is true concerning RC4 (Rivest Cipher 4)?  It was the most widely used software cipher.
  89. Which of the following is true regarding cloud storage?  One may not have control over how exactly the data is safeguarded.
  90. Which of the following may be used as an alternative to CRLs (Certificate revocation list)?  OCSP
  91. Which state legislation requires companies to report security breaches within 48 hours?  Database Security Breach Notification Act
  92. Which statement is NOT true regarding a critical asset in the enterprise environment?  It can be easily replaced
  93. Which type of attack below is similar to a passive man-in-the-middle attack?  Replay
  94. With this type of key cryptography, the sender and receiver of a message share a single common key.   Symmetric
  95. You are speaking to your CIO, and she has instructed you to ensure that the network is “five nines” in percentage of availability. What is the total yearly downtime that this allows  5.26 minutes
  96. You have been tasked with responding to a security incident involving the compromise of a manager’s documents. You and your team have determined that the attacker involved copied files via a Bluetooth connection with the manager’s unprotected cell phone. What kind of attack was this  bluesnarfing attack

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *