CYBER GATE

Create an illustration of a modern cybersecurity theme, featuring elements like firewalls, network diagrams, and digital locks, with a tech-savvy ambiance.

Cyber Gate Security Quiz

Test your knowledge in cybersecurity with our comprehensive quiz designed to assess your understanding of various concepts, from networking basics to advanced security practices.

  • 50 engaging questions
  • Covers a variety of cybersecurity topics
  • Perfect for IT professionals and enthusiasts
50 Questions12 MinutesCreated by SafeguardingFalcon542
YOUR NAME:
Which one is not type of server ?
Apache
File
Email
Application
TCP/IP
NAC Stand for?
Network Access Control
Network Admin Control
Network Assist Control
Network Admission Control
Router Connect WAN to LAN
True
False
What does L2 Switch work with?
MAC address
IP Address
What does L3 Switch work with?
MAC address
IP address
VPN Stand for
Virtual public network
Virtual private network
What is VPN Concentrator ?
Network device
Software
Web site
What is the subnet mask for 198.51.100.0/24 ?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Which of the following is the name used to identify the domain controller to client computers running earlier versions of Windows?
DNS name
Fully qualified domain name
NetBIOS name
Distinguished name
Remote Desktop Protocol Port
What does NAC use to get traffics from switch
SPAN Port
Logic Port
SPAM Port
Physical Port
What is not required when setting up PAM?
Web Server
Database
Gateway
Switch
Which one is not type of firewall?
PaloAlto
PfSense
Fortinet
ARCON
DNS Port
DHCP port
What is Snort
Firewall
IDPS
Software
Website name
is a software management strategy that isolates applications from critical system resources and other programs.
DMZ
Sandboxing
Firewall
Antivirus
Port forwarding or port mapping is an application of
DHCP
DNS
NAT
HTTP
TCP and UDP protocols work in which layer
Application
Internet
Transport
Network
How many layer are in OSI model
4
5
6
7
Firewall and IDPS devices considered as
Network security
Application security
End point security
Which one is not a way of installing firewall in the network
Bation host
Screened sub host
Dual Homed
Passive
What is CIA
Confidentiality integrity availability
Confidentiality integrity authentication
Confidentiality integrity authorization
Example of threat
System is not up to date
Loosing Money
Data
Person
Example of Vulnerability
System is not up to date
Loosing Money
Data
Person
What is LAN?
Local Area Network
Location Area Network
Local area Networking
Line Area Network
What is VPN?
Virtual Private Network
Virtual Public Network
Virtual Protect Network
Virtual Process Network
What is the number of network IDs in a class C network
22
23
24
26
LDAP port
____ is a code injecting method used for attacking the database of a system/website
HTML Injection
SQL Injection
Malicious Code Injection
XML Injection
XSS is abbreviated as
Extreme Secure Scripting
Cross site Security
X site Scripting
Cross site scripting
Which of the following is not wireless attack?
Eavesdropping
MAC Spopfing
Wireless Hijacking
Phishing
Which of this is not a network edge device?
PC
Smartphones
Servers
Switch
A set of rules that governs data communication
Protocols
Standards
RFCs
None of the mentioned
A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
Bridge
Firewall
Router
None
Internet Control Message Protocol(ICMP) has designed to compensate
Error-reporting
Error-correction
Host and management queries
All mentioned
ICMP error message will not be generated for a datagram having a special address such as
127.0.0.0
12.1.12
11.1
127
_________ type of VPNs are used for home private and secure connectivity.
Remote access VPNs
Site-to-site VPNs
Peer-to-Peer VPNs
Router-to-router VPNs
Which of the following is the most viral section of the internet?
Chat Messenger
Social networking sites
Tutorial sites
Chat-rooms
Which of the following is not an example of a passive online attack?
MiTM
Reply Attack
Phishing
Wire sniffing
___________ is a special form of attack using which hackers’ exploit – human psychology.
Cross Site Scripting
Insecure network
Social Engineering
Reverse Engineering
Which of the following is the port number for SMTP service?
25
26
27
23
Port 80 handles unencrypted web traffic.
True
False
Why it is important to know which service is using which port number?
For database security
For reporting data security to the auditor
For understanding which data is going through secured traffic and which is not
For checking unused data traffic
_________ are a specific section of any virus or malware that performs illicit activities in a system.
Malicious programs
Worms
Spyware
Payload
Which of them is not a powerful vulnerability detecting tool?
Nessus
Nexpose
Metasploit
Nmap
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.
Scratch
Patch
Fixer
Resolver
_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
Cryptography
Steganography
Tomography
Chorography
The ____________ is anything which your search engine cannot search.
Haunted web
World Wide Web
Surface web
Deep Web
{"name":"CYBER GATE", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge in cybersecurity with our comprehensive quiz designed to assess your understanding of various concepts, from networking basics to advanced security practices.50 engaging questionsCovers a variety of cybersecurity topicsPerfect for IT professionals and enthusiasts","img":"https:/images/course2.png"}
Powered by: Quiz Maker