Practice Test 4 Flashcards
Which of the following options can be used to verify data integrity?
A) MD5
B) AES
C) RAID 0
D) Blowfish
MD5
Which of the following terms describes installing an Operating System inside of a host Operating System?
A) Cloud Computing
B) VirtualBox
C) Container
D) Virtualization
Virtualization
Which of the following terms properly describes the term Wardriving?
A) Port Scanning a wifi network
B) Uses chalk or paint to mark unsecured WAPs
C) Pentesting
D) Scanning for unsecured WAPs while in a vehicle.
Scanning for unsecured WAPs while in a vehicle.
Which of the following choices can be described as a type of social engineering?
A) Xmas Attack
B) MAC Spoofing
C) Vishing
D) DDoS
Vishing
Which networking device makes it very easy for a malicious user to receive and save packets that were not intended for their workstation?
A) HUB
B) Bridge
C) Switch
D) Router
HUB
You have been tasked with finding and installing an enterprise SNMP solution. Which of the following properly describes the purpose and use of SNMP?
A) To transfer emails from server to server, using TCP port 25.
B) Remotely monitor network equipment, such as switches and routers.
C) Used to assign ports to private IPs, allowing a network to all use one public IP
D) Automates network configuration settings such as IP address, subnet masks, and default gateways
Remotely monitor network equipment, such as switches and routers.
PKI uses what type of encryption?
A) Asymmetric
B) Symmetric
Asymmetric
Which of the following terms involves the sending and receiving of unsolicited messages over Bluetooth?
A) Bluesnarfing
B) BlueJacking
C) Phishing
D) Spim
Blue Jacking
The employees at the company you work for are complaining about receiving a lot of emails advertising services and goods. What are they experiencing?
A) Spam
B) Bluesnarfing
C) Phishing
D) Whaling
Spam
Using programming or scripting in an input field, in an attempt to find a vulnerability, is known as what?
A) Hardening
B) Patching
C) Spoofing
D) Injection
Injection
Which of the following terms would be used when configuring a firewall to allow certain traffic to pass unobstructed?
A) Creating an AP
B) Creating an exception
C) Establishing a tunnel
D) Allowing a session
Creating an exception
A DoS attack can be defined as what?
A) A type of program that infects an OS, and spreads itself across the network.
B) Causing loss of availability to a service, normally by overloading it with large amounts of data.
C) A malicious program that “explodes” or attacks when a specific event happens, such as visiting a certain website.
D) A website disguising itself as another website, in an attempt to steal a username/password combination.
Causing loss of availability to a service, normally by overloading it with large amounts of data.
Which of the following standard protocols utilizes the 802.11i standard?
A) WPA2
B) WEP2
C) WEP
D) PNAC
WPA2
You are creating a new network for your company, you only want to purchase one public IP but have many hosts that will be on the network. What will ensure this is possible?
A) DMZ
B) HIDS
C) PAT
D) NAC
PAT
Which of the following protocols is a tunnel encryption used as a secure alternative to telnet?
A) Blowfish
B) TLS
C) SSL
D) SSH
SSH