Security

A cyber security themed image showcasing a digital lock, computer network, and various security icons in a futuristic design.

Ultimate Security Quiz

Test your knowledge on various aspects of security with our comprehensive quiz! This quiz covers key topics like vulnerabilities, threats, attacks, social engineering, and much more, making it perfect for anyone interested in enhancing their understanding of security protocols.

Participate now and discover:

  • Challenging questions across 49 categories
  • Insightful explanations
  • Immediate feedback on your answers
49 Questions12 MinutesCreated by SecureGuard482
What are Tangible Assets ?
IP addresses
Protocols
Physical Objects
Data
What is the Main difference Of data being in transit and At Rest
Vulnerability is :
Being Protected in a Network or System
Assurance of Transmission Medium
Flaws in a System or Network
Mention an example of Confidentiality:
Choose the Correct characteristics Of Integrity:
Trustworthiness of data over its entire life cycle
Data can be modified by everyone
Data must not be modified unauthorized
It Doesn't maintain Consistency
Availability is :
Ensures that the sender of a message cannot deny having sent it also it also implies that the receiver of the message cannot deny having received it
Free Software
To make the software / system / network / applications available to people with authorized access to these above at all times
To make the software / system / network / applications available to people with unauthorized access to these above at all times
Give a Detailed Description Of what is Non-repudiation :
When Using Protocols in a Private network , Confidential information and Credentials can be Easily read and taken ?
Yes
No
Packet Analyzer Job is to : (choose 2)
Intercept data as it is transmitted over a network and creates a backup
Intercept data as it is transmitted over a network
Encrypts data
Hash Data
Decodes Encrypted Data
Decodes the Data into a readable format for humans
Explain The operation of what happens when a Nic card is set to Promiscuous mode in a network And Differentiate what is different, When a nic card is set to non-promiscuous mode
Switch only send data to the device that should receive it even when nics are set in promiscuous mode they only see data intended for them
True
False
Mention a Protocol Analyzer software :
Give a detailed Description of Packet injection
Mention a simple way packet injection can be prevented
What is the meaning of IP spoofing?
Which of the following statements about threats to the Layer 2 switching infrastructure are true? (Choose all that apply.)
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
MAC address flooding is an attempt to force a switch to send all information out every port by overloading the MAC address table
ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
What design element would mitigate the ARP spoofing attacks? (choose 2)
Subnetting
Blocking Users to log in Wirelessy
Remove restrictions from the internet
Using Class A IP - Address
None of the Above
ARP spoofing attacks are often used to facilitate other attacks such as: (choose more than one)
Social Engineering
Spam
Dos
Man in the middle Attacks
Session hijacking
ARP spoofing attacks can only occur on -
Local area networks that utilize the Address Resolution Protocol.
Wireless local area networks that utilize the Address Resolution Protocol.
Mobile Phones
Tablets
Describe How ARP Spoofing attacks are Done :
Man in the Middle Is when an attacker ................
Describe What Happens in a Syn flood DDos
The Lowest type of an attacker can do damage to a company by making a script
True
False
Passive attacks main objective can be described as a beginning to an orchestrated attack can be described as the first stealthy attack to a network or a company
True
False
Passive attacks are for collecting information and Hack an admin
True
False
Mention a simple method of how Passive attack is done
Give a detailed description of what a an active attack is and Give an example
Social Engineering Works in certain scenario because certain techniques are used :
Innocent Talking
natural charisma
Authority
Urgency
What is social engineering ?
Phishing is
Spoofing which you are literlay hiding or disguising one computer resource as another
Spoofing which you are literlay not hiding or not disguising one computer resource as another
Fishing with bait
One of the Main critical attack a victim can fall in phishing is in
banked spoof website
Shopping Spoof Website
Information spoof website
Describe what is exactly Spear phishing
Password cracking is : (choose 2 or more )
The process of decoding a password which is encrypted
He process of guessing or recovering a password from being at rest or being authenticated over the network meaning in transit.
Password cracking can be done by having every possible combination of words and if login was successful it means the password was cracked.
Password cracking is by entering the username and password
What is a brute force attack :
Brute force attacks are similar to a dictionary attack
True
False
Give a detailed Description of a virus :
Malware are harmful software which includes viruses, worms, trojans and spyware. These are programed through lines of code which become programs which do a certain of threatful functions including stealing, encrypting deleting or modifying sensitive data, altering or hijacking core computing functions and spying on users.
True
False
Most viruses are here to cause damage, modifying data, corruption on the target.
True
False
Explain and make a difference between a virus and a worm
Worms spread fast acrosss a network therefore causing a wide spread infection which then can lead a crash on a machine or in worst cases is the flooding of a network connection.
True
False
What is Spam
Spyware a software that monitors users' activity only.
True
False
Trojan Characteristics are (multiple Choice)
Masquerade themselves in claiming to be an important
Trojans replicate themselves
Their main purpose is collecting information or setting up vulnerabilities through a computer security.
They will kill any process
Give the process of how a key logger works :
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
True
False
A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or install themselves as part of an exploit. In some cases, a worm or virus is designed to take advantage of a backdoor created by an earlier attack.
True
False
Explain what is a rootkit :
Explain the Process of Ransomware
Give a few Examples of prevention of malware :
{"name":"Security", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on various aspects of security with our comprehensive quiz! This quiz covers key topics like vulnerabilities, threats, attacks, social engineering, and much more, making it perfect for anyone interested in enhancing their understanding of security protocols.Participate now and discover:Challenging questions across 49 categoriesInsightful explanationsImmediate feedback on your answers","img":"https:/images/course7.png"}
Powered by: Quiz Maker