Security

Ultimate Security Quiz
Test your knowledge on various aspects of security with our comprehensive quiz! This quiz covers key topics like vulnerabilities, threats, attacks, social engineering, and much more, making it perfect for anyone interested in enhancing their understanding of security protocols.
Participate now and discover:
- Challenging questions across 49 categories
- Insightful explanations
- Immediate feedback on your answers
What are Tangible Assets ?
IP addresses
Protocols
Physical Objects
Data
Vulnerability is :
Being Protected in a Network or System
Assurance of Transmission Medium
Flaws in a System or Network
Choose the Correct characteristics Of Integrity:
Trustworthiness of data over its entire life cycle
Data can be modified by everyone
Data must not be modified unauthorized
It Doesn't maintain Consistency
Availability is :
Ensures that the sender of a message cannot deny having sent it also it also implies that the receiver of the message cannot deny having received it
Free Software
To make the software / system / network / applications available to people with authorized access to these above at all times
To make the software / system / network / applications available to people with unauthorized access to these above at all times
When Using Protocols in a Private network , Confidential information and Credentials can be Easily read and taken ?
Yes
No
Packet Analyzer Job is to : (choose 2)
Intercept data as it is transmitted over a network and creates a backup
Intercept data as it is transmitted over a network
Encrypts data
Hash Data
Decodes Encrypted Data
Decodes the Data into a readable format for humans
Explain The operation of what happens when a Nic card is set to Promiscuous mode in a network And Differentiate what is different, When a nic card is set to non-promiscuous mode
Switch only send data to the device that should receive it even when nics are set in promiscuous mode they only see data intended for them
True
False
Which of the following statements about threats to the Layer 2 switching infrastructure are true? (Choose all that apply.)
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
MAC address flooding is an attempt to force a switch to send all information out every port by overloading the MAC address table
ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
What design element would mitigate the ARP spoofing attacks? (choose 2)
Subnetting
Blocking Users to log in Wirelessy
Remove restrictions from the internet
Using Class A IP - Address
None of the Above
ARP spoofing attacks are often used to facilitate other attacks such as: (choose more than one)
Social Engineering
Spam
Dos
Man in the middle Attacks
Session hijacking
ARP spoofing attacks can only occur on -
Local area networks that utilize the Address Resolution Protocol.
Wireless local area networks that utilize the Address Resolution Protocol.
Mobile Phones
Tablets
The Lowest type of an attacker can do damage to a company by making a script
True
False
Passive attacks main objective can be described as a beginning to an orchestrated attack can be described as the first stealthy attack to a network or a company
True
False
Passive attacks are for collecting information and Hack an admin
True
False
Social Engineering Works in certain scenario because certain techniques are used :
Innocent Talking
natural charisma
Authority
Urgency
Phishing is
Spoofing which you are literlay hiding or disguising one computer resource as another
Spoofing which you are literlay not hiding or not disguising one computer resource as another
Fishing with bait
One of the Main critical attack a victim can fall in phishing is in
banked spoof website
Shopping Spoof Website
Information spoof website
Password cracking is : (choose 2 or more )
The process of decoding a password which is encrypted
He process of guessing or recovering a password from being at rest or being authenticated over the network meaning in transit.
Password cracking can be done by having every possible combination of words and if login was successful it means the password was cracked.
Password cracking is by entering the username and password
Malware are harmful software which includes viruses, worms, trojans and spyware. These are programed through lines of code which become programs which do a certain of threatful functions including stealing, encrypting deleting or modifying sensitive data, altering or hijacking core computing functions and spying on users.
True
False
Worms spread fast acrosss a network therefore causing a wide spread infection which then can lead a crash on a machine or in worst cases is the flooding of a network connection.
True
False
Spyware a software that monitors users' activity only.
True
False
Trojan Characteristics are (multiple Choice)
Masquerade themselves in claiming to be an important
Trojans replicate themselves
Their main purpose is collecting information or setting up vulnerabilities through a computer security.
They will kill any process
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
True
False
A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or install themselves as part of an exploit. In some cases, a worm or virus is designed to take advantage of a backdoor created by an earlier attack.
True
False
{"name":"Security", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on various aspects of security with our comprehensive quiz! This quiz covers key topics like vulnerabilities, threats, attacks, social engineering, and much more, making it perfect for anyone interested in enhancing their understanding of security protocols.Participate now and discover:Challenging questions across 49 categoriesInsightful explanationsImmediate feedback on your answers","img":"https:/images/course7.png"}
More Quizzes
Cybersecurity Quiz - Who you gonna call
11612
Practice QUIZ
10527
MANEVRA 1
402064
Sacagawea
7418
Which WWE Wrestler Are You? Free Personality
201033046
Ace AP Physics Gravity with Our Circular Motion
201038157
Free Anatomy & Physiology Chapter 5 Tissues - Try Now
201040764
Convert This Sentence Into English: Challenge
201040764
Ultimate NASCAR Trivia: How Fast Is Your Knowledge?
201023977
Ultimate NBA Trivia: Test Your Basketball Knowledge
201055719
Ultimate La Tomatina Trivia: How Long Does It Last?
201046470
Butterfly Trivia: Test Your Lifecycle Knowledge
201027222