This quiz follows the IINS 640-553 exam curriculum from Cisco. It also tries to explain the answers so it can be used as an additional learning tool. DO NOT SCRAMBLE THE ANSWERS ORDER, otherwise, the explanations will not make sense. So, let's try out this quiz. All the best!
Flood the network with pings
Use somebody else's credentials
Decrypt data
Intercepting and altering an electronic transaction.
Rate this question:
Accesses data following the company's policy
Creates backups and verifies the integrity of the backups
Reviews procedures and policies for protecting data
Initially determines the classification for data
Follows the policies to maintain data
Rate this question:
Administrative
Physical
Audit
Technical
Rate this question:
Attempts to prevent access to data
Attempts to influence the attacker not to launch an attack
Detects when data has been accessed
Detects when data has been modified
Rate this question:
Script kiddy
White hat hacker
Black hat hacker
Gray hat hacker
Phreaker
Rate this question:
Passive
Active
Close-in
Insider
Distribution
Rate this question:
Encryption / Applications with integrated security
Firewall at the network edge / HIPS
Protecting against unauthorized physical access / Authentication
Protecting against unauthorized physical access / Video monitoring systems
Secured software distribution system / Real-time software integrity checking
Rate this question:
Intrusion Detection System
Intrusion Prevention System
Distributed Layer Protection
Public Key Infrastructure
Defense in Depth
Rate this question:
IP Spoofing
Nonblind Spoofing
Blind Spoofing
SYN Spoofing
Rate this question:
Use of access control lists (ACL)
Strong password policy
Encrypt traffic
Cryptografic authentication
Open only needed ports
Rate this question:
Salami attack
Data diddling
ICMP attack
Password attack (through trojan horses, brute force attacks etc)
Hijacking a TCP session
Rate this question:
Wait!
Here's an interesting quiz for you.