ProProf - Cyber Security Quiz Questions Flashcards

1
Q

What are two types of network layer firewalls?
A. Stateful and stateless
B. Dynamic and static
C. Anomaly and signature
D. Mandatory and discretionary

A

Stateful and stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which attack requires a carrier file to self-replicate?
A. Trojan
B. Virus
C. Worm
D. Spam

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following uses asymmetric key encryption?
A. AES
B. PGP
C. 3DES
D. RC5

A

PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following offers the strongest wireless signal encryption?
A. WEP
B. WAP
C. WIPS
D. WPA

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric key encryption consists of what two key types?
A. Private signing key and public verification key
B. Sender and receiver must share a key
C. Cannot be used for non-repudiation
D. Cannot be used for sender authentication

A

Private signing key and public verification key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a type of virus?
A. Tunneling
B. Boot sector
C. Macro
D. Wrapper

A

Wrapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What defines a DoS attack?
A. Listening in on network traffic
B. Continually bombarding a network with fake requests
C. Injecting bogus networking re-configuration commands
D. Forcing reconnection to attacker’s access point

A

Continually bombarding a targeted network with fake requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What information is needed to set up a wireless access point?
A. SSID
B. MAC address
C. IP address
D. ARP

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a password hashing algorithm?
A. AES
B. MD4
C. PGP
D. 3DES

A

MD4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two types of intrusion prevention systems?
A. Passive and active
B. Anomaly and signature
C. Host and network
D. Internal and external

A

Host and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which test gives little to no information to the penetration tester?
A. Grey Box
B. White Box
C. Blue Box
D. Black Box

A

Black Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT a DoS attack?
A. Server Spoofing
B. Ping Broadcast
C. Ping of Death
D. Smurf

A

Server Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Someone posing as an IT tech asking for your computer configuration is what type of attack?
A. Insider threat
B. Phishing
C. Social engineering
D. Whaling

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a password-cracking tool?
A. HoneyMonkey
B. Cain and Abel
C. John the Ripper
D. Hashcat

A

HoneyMonkey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Monitoring software installed without your consent is called what?
A. Malware
B. Adware
C. Spyware
D. Ransomware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a secure remote access protocol?
A. SSH
B. FTP
C. Telnet
D. SMTP

A

SSH

17
Q

What is an event where an IDS alarm goes off, but no attack has occurred?
A. False Positive
B. False Negative
C. True Negative
D. True Positive

A

False Positive

18
Q

Which is the security standard for WPA2?
A. 802.11ad
B. 802.11i
C. 802.11n
D. 802.11a

A

802.11i

19
Q

A network site that appears valuable but is monitored and isolated is known as what?
A. Pseudo-network
B. Honeypot
C. Virtual Network
D. Canary Trap

A

Honeypot

20
Q

What are two types of role-based access control lists?
A. Object and permission
B. Filesystem and networking
C. Dynamic and static
D. Mandatory and discretionary

A

Mandatory and discretionary