Assessment Test Flashcards
Which of the following programming language is particularly vulnerable to buffer overflows? A. .NET B. Pascal C. C D. Basic
The C prog language is vulnerable because some of its functions do not perform proper bounds checking.
(CH.5)
Which of the following is not considered one of the three basic tenants of security? A. Integrity B. Non-repudiation C. Availability D. Confidentiality
B. Non-repudiation is not considered one of the three basic tenets of security. (Ch.3)
Many organizations start the Pre-employment process with a ___________ check.
Background (Ch.7)
In cryptography the process of converting clear text into something that is unreadable is known as ______.
Encryption (Ch.2)
Which transport protocol is considered connection based? A. IP B. TCp C. UDP D. ICMP
TCP (Ch.1)
Which of the following is not an advantage of cloud computing?
A. Reduced cost
B. The ability to access data and applications from many locations.
C. Increased Cot
D. The ability to pay as you go.
C. Increased cost (Ch.3)
The term ACL is most closely related to which of the following? A. Hub B. switch C. Bridge D. Router
D. The term ACL is most closely related to a router. ACL’s are used as a basic form of firewalls. (Ch.4)
A \_\_\_\_\_\_ is used to maintain session or state when moving from one web page to another. A. Browser B. Cookie C. Session ID D. URL
B. A cookie (Ch.5)
In the study of cryptography, \_\_\_\_\_\_\_ is used to prove the identity of an individual. A. Confidentiality B. Authenticity C. Integrity D. Availability
B. Authenticity (Ch.1)
Backtrack is an example of what? A. Linux bootable distribution B. Session hijacking C. Windows bootable preinstall program D. VoIP capture tool
A. Linux bootable distribution (Ch.8)
Which of the following is the basic transport protocol for the web? A. HTTP B. UDP C. TFTP D. FTP
A. HTTP (Ch.5)
This type of attack does not give an attacker access but blocks legitimate users? A. Sniffing B. session hijacking C. Trojan D. Denial of Service
D. Denial of service (Ch.6)
IPv4 uses addressed of what length? A. 8 B. 16 C. 32 D. 64
C. 32 (ch.1)
\_\_\_\_\_\_ can be used as a replacement for POP3 and offers advantages over POP3 for mobile users. A. SMTP B. SNMP C. POP3 D. IMAP
D. IMAP (Ch.10)
What port foes HTTP use by default? A. 53 B. 69 C. 80 D. 445
C. HTTP (Ch.4)