The 'IT Security Mid Term' quiz assesses knowledge on network protocols, OSI model layers, and data encryption. It is designed to test the understanding of hardware addressing, data transportation, and protocol types in network communications, crucial for IT security professionals.
Presentation
Session
Transport
Physical
Application
Network
Data Link
Rate this question:
Session
Transport
Data Link
Presentation
Rate this question:
Transport
Network
Physical
Data Link
Rate this question:
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Rate this question:
IP
UDP
TCP
ICMP
None of the above
Rate this question:
Security, Integrity, Functionality
Security, Ease of Use, Functionality
Availability, Ease of Use, Functionality
Confidentiality, Secuirty, Ease of Use
Confidentiality, Integrity, Availability
Rate this question:
Type - 2 bytes
Data - 64 to 1500 bytes
Frame Check Sequence (FCS) - 4 bytes
Preamble - 8 bytes
Destination/Source Address - 6 bytes ea
Rate this question:
Low physical security
Active services
Open Ports
The human element
Bad passwords
Rate this question:
Source and Destination IP
Source and Destination Port
Sequence Number
Connection Number
A &B only
Rate this question:
Value of next sequence number destination expects to receive and ACK flag
SYN bit of establishing connection
Initial sequence number
Rate this question:
Profie
Religious/Political/Ethical reasons
"Mount Everest" syndrome
Revenge
To secure it
Rate this question:
True
False
Rate this question:
Threat
Vulnerability
Comprosmise
Risk
None of the above
Rate this question:
Confidentialtiy
Ease of Use
Availability
Integrity
Accountablility
Rate this question:
Accountability
Integrity
Availability
Confidentiality
None of the above
Rate this question:
Confirming your identity with an element unique to the individual
Supplying your identity
Using your identity to assign access rights
Tracking what users are doing while accessing the systems
None of the above
Rate this question:
Nmap
Snort
Nessus
Nmap
Tcpdump
Rate this question:
Separtation of Privileges
Principle of Least Privileges
Defence in Depth
Security through obscurity
All of the above
Rate this question:
Over the internet
Over the LAN
Locally
Offline
Ignorance
Rate this question:
Active, Passive
Passive, Active
Active, Submissive
Positive, Active
None of the above
Rate this question:
Ping
Snort
Nessus
Ethereal
Tcpdump
Rate this question:
Confirming your identity with an element unique to the person
Supplying your identity
Using your identity to assign access rights
Tracking what users are doing while accessing the systems
None of the above
Rate this question:
Destruction
Integrity
Alteration
Disclosure
Confidentiality
Rate this question:
True
False
Rate this question:
IP header content
Layer 4 Protocol header (TCP, UDP, ICMP, etc) content
Data Payload
Layer 5, 6 and 7 information
A & B only
Rate this question:
Confidentiality
Availability
Accessiblity
Functionality
Integrity
Rate this question:
Ping
Traceroute
Route
NMap
None of the above
Rate this question:
Confirming you identity with an element unique to the person
Supplying your identity
Using your identity to assign access rights
Tracking what users are doing while accessing the systems
None of the above
Rate this question:
Ping
Snort
NMap
Ethereal
Tcpdump
Rate this question:
Ethereal, Nmap
Nmap, Tcpdump
Tcpdump, Nessus
Ethereal, Nessus
Ethereal, Snort
Rate this question:
TCP
ICMP
UDP
IP
ARP
Rate this question:
True
False
Rate this question:
Disclosure
Denial of Service
Alteration
Destruction
Obscurity
Rate this question:
Confidentiality
Availability
Integrity
Accountability
Disclosure
Rate this question:
Active Reconnaissance
Passive Reconnaissance
IP Spoofing
Exploiting a system
None of the above
Rate this question:
Protocol (TCP, UDP, ICMP, etc) header
IP Header
Payload
MAC header
None of the above
Rate this question:
Identification
Granularity
Authentication
Authorization
Accountability
Rate this question:
True
False
Rate this question:
Token-based authentication
Password authentication
Biometric authentication
Multi-factor authentication
None of the above
Rate this question:
Confirming your identity with an element unique to the person
Supplying your identity
Using your identity to assign access rights
Tracking what users are doing while accessing the systems
None of the above
Rate this question:
Listening
Prometric
Promiscuous
Normal
None of the above
Rate this question:
TCP
UDP
IP
ICMP
None of the above
Rate this question:
Accountability
Availability
Integrity
Confidentiality
Security
Rate this question:
Authorization
Authentication
Verification
Identification
Clarification
Rate this question:
True
False
Rate this question:
IP
UDP
TCP
ICMP
None of the above
Rate this question:
SYN Flag
Payload Flag
FIN Flag
ACK Flag
RST Flag
Rate this question:
IP Header content
MAC Address
Payload
Protocol header
All of the above
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.