$RHBYGY8
$RHBYGY8
Your Name:
A. IP address
B. Logical address
C. Physical address
D. Mac address
A. Wireless NIC
B. Internal NIC
C. USB-based NIC
D. External NIC
A. Network adapter
B. HTTP
C. IP address
D. Mac address
A. Network devices
B. Network software
C. Network hardware
D. Network protocols
Untitled Quiz
Your Name:
A. Router
B. Hub
D. Switches
B. It is a proprietary protocol
A. TCP/IP v6
B. TCP/IP v5
C. TCP/IP v4
D. TCP/IP v3
Computer Network Layers
Your Name:
A. 48
B. 16
C. 128
D. 32
A. 340 trillion
B. 340 undecillion
C. 340 billion
D. 340 gazillion
8. What is the command to find your private IP?
A. Ipconfig /release
B. Ipconfig /all
C. GetMac
D. Ipconfig
Computer Networking and Remote Access
Your Name:
A. IMAP4
B. RDP
C. SMTP
D. POP3
A. Telnet/SSH
B. RDP
C. SMTP
D. POP3
A. Smart Homes
B. Email management
C. Healthcare management
D. Energy management
A. 49,152 to 65,535
B. 65,536 to 80,000
C. 0 to 1,023
D. 1,024 to 49,151
A. HTTP
B. FTP
C. SMTP
D. DNS
A. Telnet/SSH
B. FTP
C. HTTP
D. DNS
Your Name:
A. MAC address
B. HTTP address
C. URL
D. IP address
B. A network device
A. TCP/IP v3
B. TCP/IP v7
C. TCP/IP v5
D. TCP/IP v6
Hacking Phases and Techniques
Your Name:
B. Spoof attack
C. HiJack attack
D. Phishing attack
A. Social engineering
B. Spoofing
C. HiJacking
D. Phishing
4. What type of attack involves sending more data to an
application than is expected?
B. Phishing attack
C. HiJack attack
D. Spoof attack
A. Phishing attack
B. HiJack attack
D. Spoof attack
A. HiJack attack
C. Phishing attack
D. Spoof attack
B. A disgruntled employee
C. A network engineer
D. A system administrator
8. What is the goal of the maintaining access phase in an
attack?
D. To cover tracks
Your Name:
A. Spyware
B. Spammer
C. Phisher
D. Hacker
A. Spam
B. Spyware
C. Viruses
D. Trojan Horses
4. What is the term used to describe a program that
gathers personal information from a computer without
permission?
A. Trojan Horse
B. Spyware
C. Worm
D. Virus
A. NIDS
B. Firewall
C. Proxy Server
D. VPN
A. VPN
B. NIDS
C. Proxy Server
D. Firewall
8. What is the type of firewall that prevents or allows
access based on IP or MAC addresses?
B. SPI
B. Stateful firewall
C. Packet-filtering firewall
D. Traditional firewall
B. To provide confidentiality
A. Digital signing
B. Hashing
C. Decryption
D. Encryption
D. To provide encryption
A. Asymmetric encryption
B. Symmetric encryption
C. Hash-based encryption
D. Public-key encryption
16. What is the main advantage of using a NGFW over a
traditional firewall?
A. Increased speed
B. Lower cost
C. Reduced complexity
D. Improved security
Information Security Fundamentals
Your Name:
D. Symmetric key uses two keys, while asymmetric key uses one key
A. Implementing firewalls
B. Risk
C. Encrypting data
A. Reconnaissance
B. Phishing
C. Hijacking
D. Social engineering
A. Hijacking attack
B. Phishing attack
C. Insider attack
D. Reconnaissance attack
11. What is the term for a fake web page that looks
exactly like a popular website, used to persuade users to
enter sensitive information?
A. Hijacking attack
B. Reconnaissance attack
C. Phishing attack
D. Insider attack
12. What is the term for a hacker taking over a session
between two individuals and disconnecting the other
individual from the communication?
A. Insider attack
B. Phishing attack
C. Hijacking attack
D. Reconnaissance attack
A. Covering tracks
B. Maintaining access
C. Reconnaissance
D. Gaining access