Security 3 :

Create an engaging, modern digital artwork depicting various cybersecurity elements like locks, shields, and network diagrams, symbolizing protection against cyber threats.

Security Essentials Quiz

Test your knowledge of cybersecurity with our comprehensive quiz on access control, encryption, and malware! Perfect for anyone looking to enhance their understanding of digital security.

Key Topics Covered:

  • Access Control Mechanisms
  • Types of Malware
  • Encryption and Cryptography
  • Network Security Practices
37 Questions9 MinutesCreated by DefendingData512
Access control :is way of limiting access to a system or to physical or virtual resources
True
False
HMAC is a message authentication code (MAC) that is calculated using a hash function and a secret key. Hash-based Message Authentication Code (HMAC) is a message authentication code that uses a cryptographic key in conjunction with a hash function.
True
Ping sweep : where the attacker scan every Mac in that subnet and to check whether there is live hosts
True
False
False : because it scans every nic card
False : because it scans every IP
Stream cipher each bit or byte in the plain text is encrypted one at a time. Usually the plan text is combined with a separate random generated message/messages.
True
False
Describe the Process of what happens in network scanning :
Discovering live hosts - host discovery
Discovering offline hosts - host discovery
Identifying the services that are listening on the open ports
Identifying users
Identifying the services that are not listening to the open ports
Determining OS of these computers
Identifying open ports - port scanning
Identifying hackers
Identifying attackers
Select the True Characteristics of a transport encryption
Transport encryption refers to encrypting data as it is sent over a network.
VLS is used
Are hashing protocols that provide communications security over a computer network
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communications security over a computer networks
Asymmetric cryptography is used
Symmetric cryptography is used to encrypt the data transmitted
The connection is not secure
The connection is secure
Are cryptographic protocols that provide communications security over a computer networks
Stream cipher each 100 words in the plain text is encrypted one at a time. Usually the plan text is combined with a separate random generated message/messages.
False
True
Viruses are those that infects executable files and they can be transferred on datafiles once the user runs the exe file the virus activates and will do a harmful process to the computer system or network it will also have the capability of adapting and attaching to other files meaning it can replicate itself and attaches to other files.
True
False
Explain and make a difference between a virus and a worm Viruses are those that infects executable files and they can be transferred on datafiles once the user runs the exe file the virus activates and will do a harmful process to the computer system or network it will also have the capability of adapting and attaching to other files meaning it can replicate itself and attaches to other files. While worms Worms usually "lives" inside of files often their habitat is in word or excel documents. The worm will use a host file in a way that it will release a document that has already a worm in it. The entire document will travel from computer to computer. Worms spread fast acrosss a network therefore causing a wide spread infection which then can lead a crash on a machine or in worst cases is the flooding of a network connection.
True
False
Explain and make a difference between a virus and a worm Viruses are those that infects email files and they can be transferred on datafiles once the user runs the exe file the virus activates and will do a harmful process to the computer system or network it will also have the capability of adapting and attaching to other files meaning it can replicate itself and attaches to other files. While worms Worms usually "lives" inside of files often their habitat is in word or excel documents. The worm will use a host file in a way that it will release a document that has already a worm in it. The entire document will travel from computer to computer. Worms spread fast acrosss a network therefore causing a wide spread infection which then can lead a other viruses on a machine or in worst cases is the flooding of a network connection.
True
False
A sniffer is a tool that captures frames moving over the network medium. This might be a cabled or wireless network.
True
False
A Man-in-the-Middle attack is where the attacker sits between two communicating hosts, and transparently captures monitors, and relays all communication between the hosts.
True
False
A spoofing (or masquerade) attack involves the attacker does not imitating some sort of resource that the victim thinks is genuine.
True
False
A spoofing (or masquerade) attack involves the attacker imitating some sort of resource that the victim thinks is genuine.
True
False
This term refers to phony email messages, usually advertising pornography, miracle cures, bogus investments, etc.​
Spam
Virus
Popcorn attack
Malware
Spam is also used to launch phishing attacks and spread viruses and worms​
True
False
Software that monitors user activity and sends the information to someone else​ Spyware may generate browser pop-up windows to try to direct the user to other websites​ ​ Adware is any type of software or browser plug-in that displays adverts.​ Some adware may exhibit spyware-like behaviour, by tracking the websites a user visits and displaying targeted ads for instance.​
True
False
Also called Trojan horses​ A program that disguises itself as some other known software or file. ​ Trojans do not self-replicate​ Actually the main purpose may be stealthy and ​ to go unnoticed​
True
False
Block cipher encryption uses
Symettric
Asymettric
Stream cipher uses
Symettric
Asymettric
RC4
MD5 is used for
Password Storage
Encryption of short data
Encryption of large data
In the authentication credentials , something you know is the most
Weakest
Strongest
Neither
Access control is Granting or denying an access of a rescource
False
True
Linux permission are divided in
User
Group
Root
Character
Tailor
Owner
All
Global
Other
We arrive at the appropriate number by assigning each type of permission a numerical value:​ 4 = read permissions​ 2 = write permissions​ 1 = execute permission​
True
False
We arrive at the appropriate number by assigning each type of permission a numerical value:​ 1 = read permissions​, 6 = write permissions,​ 2 = execute permission​
True
False
Since reconnaissance is a first step to additional attacks, it is necessary to reduce the opportunities to an attacker.​ A security professional can detect a network scan while it is happening by configuring alarms to send notifications.​
False
True
Ftp(TCP) is Port :
14
18
11
1
21
6
9
1234
SSH(TCP) is port :
55
11
22
78
43
431
Telnet(TCP) is Port :
11
18
645
453
213
41
213
23
Smtp(TCP) Is port :
453
12
43
11
21
445
25
DNS(TCP + UDP) is port
53
123
54
12
56
47
122
432
HTTP(TCP) is port :
21
80
13
83
445
221
4442
234
HTTPS ( TCP) is port :
5
112
442
553
443
116
Netbios(TCP + UDP ) port range is : 135-139
True
False
Netbios(TCP + UDP ) port range is : 130-145
True
False
Smb (tcp) is port :
213
451
231
432
321
21
445
{"name":"Security 3 :", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of cybersecurity with our comprehensive quiz on access control, encryption, and malware! Perfect for anyone looking to enhance their understanding of digital security.Key Topics Covered:Access Control MechanismsTypes of MalwareEncryption and CryptographyNetwork Security Practices","img":"https:/images/course3.png"}
Powered by: Quiz Maker