العبيد 1

Which of the following are examples of (something you know) authentication factors? (Choose Two):
Finger prints
ID card
Location
Key
IP address
Retinal patterns
PIN
Password
Handprints
Which of the following are examples of (something you have) authentication factors? (Choose Two)
Finger prints
ID card
Location
Key
IP address
Retinal patterns
PIN
Password
Handprints
Which of the following are examples of (something you are) authentication factors? (Choose Three)
Finger prints
ID card
Location
Key
IP address
Retinal patterns
PIN
Password
Handprints
Which of the following are examples of (something where you are) authentication factors? (Choose Two)
Finger prints
ID card
Location
Key
IP address
Retinal patterns
PIN
Password
Handprints
Worm
The attacker attempts to trick people to reveal secret information
It's a malware that carries out malicious operations under the guise the desired function
It's a malicious code that is attached to executable files
Replicate themselves by independently exploiting vulnerabilities in networks
Virus
The attacker attempts to trick people to reveal secret information
It's a malware that carries out malicious operations under the guise the desired function
It's a malicious code that is attached to executable files
Replicate themselves by independently exploiting vulnerabilities in networks
Trojan horse
The attacker attempts to trick people to reveal secret information
It's a malware that carries out malicious operations under the guise the desired function
It's a malicious code that is attached to executable files
Replicate themselves by independently exploiting vulnerabilities in networks
Social engineering
The attacker attempts to trick people to reveal secret information
It's a malware that carries out malicious operations under the guise the desired function
It's a malicious code that is attached to executable files
Replicate themselves by independently exploiting vulnerabilities in networks
DDOS
Overwhelming the target with traffic from multiple sources
Overwhelming the target with traffic from single sources
Attacking several targets
Which of the following is another name for a white hat hacker?
Cybercriminal
Script kiddies
Security audito
Ethical hacker
Which of the following is another name for a black hat hacker
Cybercriminal
Script kiddies
Security audito
Ethical hacker
CIA stands fo
Confidentiality, integrity, Authentication
Confidentiality, integrity, Availability
Confidentiality, integrity, Access of network
Computer, integrity, Availability
If you are contracted to do a penetration test inside a company network, and submit a final report to the higher management, what type of hackers you are?
Grey hat hacke
Black hat hacker
White hat hacke
Malware is
Any software used to protect the PC from viruses
Any software used to disrupt computer operations
Any software used to clean up the disk
SSH can be used to
Unsecure remote access to a network device
Remote secure access through line vty
Secure access through the device console
Authorization is
Who are you?
What you can do
Reviewing log files
Proving that you are that identity
Authentication is
Who are you?
What you can do
Reviewing log files
Proving that you are that identity
Accounting is
What you can do
Proving that you are that identity
What you have done
The allows and denials of resource and object access for a specific identity
The hacker is
A clever programmer capable of developing new programs and coding changes to existing programs to make them more efficient
A network professional that uses sophisticated programming skills to ensure that networks are not vulnerable to attack
A person who tries to gain unauthorized access to devices on the internet
Individuals who run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers
All above answers are correc
All above answers are not correc
{"name":"العبيد 1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following are examples of (something you know) authentication factors? (Choose Two):, Which of the following are examples of (something you have) authentication factors? (Choose Two), Which of the following are examples of (something you are) authentication factors? (Choose Three)","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker