امن المعلومات
Cybersecurity Knowledge Challenge
Test your knowledge on information security with our engaging and informative quiz! This quiz covers various aspects of cyber threats, protection strategies, and authentication processes, allowing you to assess your expertise in the field of cybersecurity.
Key Features:
- Multiple-choice and checkbox questions
- Focus on real-world cybersecurity issues
- Improve your understanding of important concepts
To mitigate MAC address attacks
Disable tracking and DTP on access ports
Secure unused ports
Explicitly configure trunk ports and change native VLAN
Configure port security
The hacker is
A clever programmer capable of developing new programs and coding changes to existing programs to make them more efficient
A network professional that uses sophisticated programming skills to ensure that networks are not vulnerable to attack
A person who tries to gain unauthorized access to devices on the internet
Individuals who run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers
All above answers are correct
All above answers are not correct
SSH can be used to
Remote secure access through line vty
Unsecure remote access to a network device
Secure access through the device console
Which of the following is another name for a black hat hacker
Script kiddies
Ethical hacker
Security auditor
Cybercriminal
If you are contracted to do a penetration test inside a company network, and submit a final report to the higher management, what type of hackers you are?
Grey hat hacker
Black hat hacker
White hat hacker
CIA stands for:
Confidentiality, integrity, Authentication
Confidentiality, integrity, Availability
Confidentiality, integrity, Access of network
Computer, integrity, Availability
What is a signature?
A set of rules that an IDS and an IPS use to detect all intrusion activates
A software that an IDS and an IPS use to detect typical intrusion activity
A software that an IDS and an IPS use to detect all intrusion activity
A set of rules that an IDS and an IPS use to detect typical intrusion activates
Which of the following is another name for a white hat hacker?
Cybercriminal
ï‚· Script kiddies
Security auditor
Ethical hacker
DDOS:
Overwhelming the target with traffic from multiple sources
Overwhelming the target with traffic from single sources
Attacking several targets
Malware is:
Any software used to protect the PC from viruses
Any software used to disrupt computer operations
Any software used to clean up the disk
Trojan horse
It's a malicious code that is attached to executable files
It's a malware that carries out malicious operations under the guise the desired function
The attacker attempts to trick people to reveal secret information
Replicate themselves by independently exploiting vulnerabilities in networks
Virus:
It's a malware that carries out malicious operations under the guise the desired function
Replicate themselves by independently exploiting vulnerabilities in networks
It's a malicious code that is attached to executable files
The attacker attempts to trick people to reveal secret information
Worm:
The attacker attempts to trick people to reveal secret information
It's a malware that carries out malicious operations under the guise the desired function
It's a malicious code that is attached to executable files
Replicate themselves by independently exploiting vulnerabilities in networks
Authentication is
Reviewing log files
Defining the allows and denials of resource and object access for a specific identity
Who are you
How are you
Authorization is
Who are you?
What you can do
Reviewing log files
Proving that you are that identity
Accounting is
What you can do
Proving that you are that identity
Defining the allows and denials of resource and object access for a specific identity
What you have done
Which of the following are examples of (something where you are) authentication factors? (Choose Two)
Ï‚· Retinal patterns
Password
IP address
ID card
Location
PIN
Finger prints
Key
Handprints
Which of the following are examples of (something you are) authentication factors? (Choose Three)
ID card
Password
Retinal patterns
Finger prints
PIN
LocationI
IP address
Handprints
Which of the following are examples of (something you know) authentication factors? (Choose Two)
Location
Key
Finger prints
Password
ID card
PIN
When TACACS+ is compared to RADIUS: (Choose Four)
TACACS+ uses TCP
TACACS+ is standard
TACACS+ encrypts entire packet
RADIUS is a standard
RADIUS uses UDP
Which of the following security protocols are used for wireless network security? (Choose 3)
IPsec
WPA
WAP
WPA2
WEP
WEB
Which of the following is the strongest security protocol used to protect WiFi network?
WPA2
WPA
WEP
WAP
Which of the following are components of AAA? (Choose 3)
Authentication
Accounting
Authorization
Administration
It is recommended to place Extended ACL close to the source
True
False
Wireless security is very important because the wireless media is shared and any one around can access and scan the network
True
False
In wireless passive mode the access point periodically sends its name.
True
False
MAC filtering is a whitelist of MAC addresses that can connect
True
False
IPS can examine the entire content of the packet
True
False
Eavesdropping is very difficult in wireless networks
True
False
SSID is the name of wired network
True
False
A wireless network is more secure than a wired network
True
False
Firewall examines only the source IP address
True
False
Digital signature is a set of rules that an IDS and an IPS use to detect all intrusion activities
True
False
{"name":"امن المعلومات", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on information security with our engaging and informative quiz! This quiz covers various aspects of cyber threats, protection strategies, and authentication processes, allowing you to assess your expertise in the field of cybersecurity. Key Features: Multiple-choice and checkbox questions Focus on real-world cybersecurity issues Improve your understanding of important concepts","img":"https:/images/course8.png"}