When you have a computer on which you use sensitive information like bank details and passwords, you’re probably content in the knowledge that it’s being protected so long as you have decent internet security installed. Have you ever stopped to think about what processes go into ensuring computers are kept safe from malware and hacking? Take this quiz to learn See moreall about it! Good luck!
ARP Poisioning
Port mirroring
Port security
MAC flooding
VLANs
Rate this question:
Install a proxy server
Install a load balancer
Configure the web site in a VLAN
Configure port security
Rate this question:
Router
Load balancer
Proxy server
CAT 5e
Rate this question:
ARP
TCP
ICMP
UDP
Rate this question:
0
4
8
9
Rate this question:
ACK/SYN, ACK, SYN
SYN, ACK/SYN, ACK
ACK, SYN, ACK/SYN
SYN, ACK, ACK/SYN
Rate this question:
23
22
80
143
443
Rate this question:
Disable unused ports
Enable all unused ports
Configure port security
Disable port security
Enable console password
Disable console password
Rate this question:
ARP poisoning
Port mirroring
Port security
MAC flooding
VLANs
Rate this question:
Confidentiality
Accountability
Integrity
Availability
Rate this question:
Confidentiality
Accountability
Integrity
Availability
Rate this question:
Confidentiality
Accountability
Integrity
Availability
Rate this question:
Authentication
Identification
Authorization
Confidentiality
Rate this question:
Authentication
Identification
Authorization
Confidentiality
Rate this question:
Username and password
Smartcard
PIN number
Fingerprint
Retina scan
Rate this question:
Authenticated
Identified
Authorized
Encrypted
Rate this question:
Due diligence
Separation of duties
Least privilege
Due care
Rate this question:
Rotation of duties
Separation of duties
Least privilege
Due care
Rate this question:
To limit fraudulent activities within the organization
To keep data private to the appropriate individuals
To make information available
To ensure the secrecy of the information
Rate this question:
Rotation of duties
Separation of duties
Least privilege
Due care
Rate this question:
Due diligence
Separation of duties
Least privilege
Due care
Rate this question:
Black-hat
Gray-hat
White-hat
Yellow-hat
Rate this question:
Custodian
Owner
User
Administrator
Rate this question:
Custodian
Owner
User
Administrator
Rate this question:
Procedure
Standard
Guideline
Least privilege
Rate this question:
Postal code
Driver’s license
City name
Social Security number
Street name
Rate this question:
Obtain management approval and support.
Create the AUP.
Download sample templates.
Review job roles.
Rate this question:
Firewall policy
Proxy server policy
AUP
Hiring policy
Rate this question:
AUP
Hiring policy
VPN policy
Firewall policy
Rate this question:
VPN policy
Password policy
AUP
Secure disposal of computers
Rate this question:
AUP
Password policy
Virus protection policy
Secure disposal of computers
Rate this question:
Employees, information
Management, employees
Information, employees
Employees, management
Rate this question:
Least privilege
Job rotation
Separation of duties
AUP
Rate this question:
To keep the employee refreshed and energized
To hold employees accountable for any suspicious activity
To keep the employee happy
To raise company morale
Rate this question:
Least privilege
AUP
Disabling the employee’s user accounts and access cards
Job rotation
Rate this question:
Review logs
See if anyone wants his office space
Disable the employee’s user accounts and access cards
Format the drive on his workstation
Rate this question:
Educate Sue on the fact that those programs are popular ways to spread viruses, so no, the company does not allow P2P software on its systems.
Tell her no.
Tell her yes as long as she does not watch the movies during work hours.
Tell her yes as long as she places the downloaded movies on the server so that you can virus scan them.
Rate this question:
Horseback riding
Worming
Tailgating
Gliding
Rate this question:
Purchase an additional lock.
Training and awareness.
Purchase a revolving door.
Purchase a mantrap.
Rate this question:
Use a firewall.
User awareness and training.
Install antivirus software.
Implement physical security.
Rate this question:
Locked doors
Electronic keypads
Swipe cards
Mantrap
Rate this question:
Whaling
Phishing
Pharming
Spim
Rate this question:
Man-in-the-middle
Spoofing
Denial of service
Port scanning
Rate this question:
DDoS
DoS
Phishing
MiTM
Rate this question:
Sam
Hosts
Lmhosts
Services
Rate this question:
DDoS
DoS
DNS poison
MiTM
Rate this question:
Phishing
Pharming
Spim
Spoofing
Rate this question:
Password complexity
Account lockout
Network firewall
Intrusion detection system
Rate this question:
Quiz Review Timeline (Updated): Jun 10, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.