Assessment Flashcards
Which of the programming languages is particularly vulnerable to buffer overflows? A. .Net B. Pascal C. C D. Basic
C. The C programming language is particularly vulnerable to buffer overflows. This is because some functions do not perform proper bounds checking.
Which of the following is not considered one of the three principles of security? A. Integrity B. Non-Repudiation C. Availability D. Confidentiality
B. Non-repudiation is not considered one of the three principles of security.
Many organizations start the preemployment process with a \_\_\_\_\_\_\_\_\_\_ check. A. Marriage B. Background C. Height D. Golf Handicap
B. Many organizations start the preemployment process with a background check. This process is done to make sure the right person is hired for the job.
In cryptography, the process of converting clear text into something that is unreadable is known as \_\_\_\_\_\_\_\_\_\_. A. Encryption B. Plain text C. Digital signature D. Cryptanalysis
A. In cryptography, the process of converting clear text into something that is unreadable is known as encryption.
Which transport protocol is considered connection-based? A. IP B. TCP C. UDP D. ICMP
B. TCP is considered a protocol, whereas UDP is considered connectionless.
Which of the following is not an advantage of cloud computing?
A. Reduced cost
B. The ability to access data and applications from many locations
C. Increased cost
D. The ability to pay as you go
C. Although there are many benefits to cloud computing, increased cost is not one of them. Cloud computing is designed to lower costs.
The term ACL is most closely related to which of the following? A. Hub B. Switch C. Bridge D. Router
D. The term ACL is most closely related to a router. ACLs are used as a traffic control.
A \_\_\_\_\_\_\_\_\_\_ is used to maintain session or state when moving from one web page to another. A. Browser B. Cookie C. Session ID D. URL
B. A cookie is used to maintain state when moving from one web page to another.
In the study of cryptography, \_\_\_\_\_\_\_\_\_\_ is used to prove the identity of an individual. A. Confidentially B. Authenticity C. Integrity D. Availability
B. In the study of cryptography, authenticity is used to prove the identity of an individual.
Kali is an example of what? A. Linux bootable distribution B. Session hijacking C. Windows bootable preinstall program D. VoIP capture tool
A. Kali is an example of a Linux bootable distribution. It is one of the items on the CASP+ tools and technology list.
Which of the following is the basic transport protocol for the web? A. HTTP B. UDP C. TFTP D. FTP
A. HTTP is the basic transport protocol for the web. HTTP uses TCP as a transport.
Which type of attack does not give an attacker access but blocks legitimate users? A. Sniffing B. Session hijacking C. Trojan D. Denial of service
D. A denial of service does not give an attacker access but blocks legitimate users.
IPv4 uses addresses of what length in bits? A. 8 B. 16 C. 32 D. 64
C. IPv4 uses 32-bit addresses, whereas IPv6 uses 128-bit addresses.
\_\_\_\_\_\_\_\_\_\_ can be used as a replacement for POP3 and offers advantages over POP3 for mobile users. A. SMTP B. SNMP C. POP3 D. IMAP
D. IMAP can be used as a replacement for POP3, and it offers advantages over POP3 for mobile users, such as remote mail and folder management, so it’s easier to view from multiple locations.
What port does HTTP use by default? A. 53 B. 69 C. 80 D. 445
C. HTTP uses port 80 by default.