ProProf - Cyber Security Quiz Questions Flashcards
What are two types of network layer firewalls?
A. Stateful and stateless
B. Dynamic and static
C. Anomaly and signature
D. Mandatory and discretionary
Stateful and stateless
Which attack requires a carrier file to self-replicate?
A. Trojan
B. Virus
C. Worm
D. Spam
Worm
Which of the following uses asymmetric key encryption?
A. AES
B. PGP
C. 3DES
D. RC5
PGP
Which of the following offers the strongest wireless signal encryption?
A. WEP
B. WAP
C. WIPS
D. WPA
WPA
Asymmetric key encryption consists of what two key types?
A. Private signing key and public verification key
B. Sender and receiver must share a key
C. Cannot be used for non-repudiation
D. Cannot be used for sender authentication
Private signing key and public verification key
Which of the following is NOT a type of virus?
A. Tunneling
B. Boot sector
C. Macro
D. Wrapper
Wrapper
What defines a DoS attack?
A. Listening in on network traffic
B. Continually bombarding a network with fake requests
C. Injecting bogus networking re-configuration commands
D. Forcing reconnection to attacker’s access point
Continually bombarding a targeted network with fake requests
What information is needed to set up a wireless access point?
A. SSID
B. MAC address
C. IP address
D. ARP
SSID
Which of the following is a password hashing algorithm?
A. AES
B. MD4
C. PGP
D. 3DES
MD4
What are two types of intrusion prevention systems?
A. Passive and active
B. Anomaly and signature
C. Host and network
D. Internal and external
Host and network
Which test gives little to no information to the penetration tester?
A. Grey Box
B. White Box
C. Blue Box
D. Black Box
Black Box
Which of the following is NOT a DoS attack?
A. Server Spoofing
B. Ping Broadcast
C. Ping of Death
D. Smurf
Server Spoofing
Someone posing as an IT tech asking for your computer configuration is what type of attack?
A. Insider threat
B. Phishing
C. Social engineering
D. Whaling
Social engineering
Which of the following is NOT a password-cracking tool?
A. HoneyMonkey
B. Cain and Abel
C. John the Ripper
D. Hashcat
HoneyMonkey
Monitoring software installed without your consent is called what?
A. Malware
B. Adware
C. Spyware
D. Ransomware
Spyware