(These quizzes were derived from the ITS curriculum at algonquin college in order to help with study of material. These quizzes, in no way represent the curriculum as a whole. Is just a gathering of information to help you study)
Yes
No
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
False
True
Rate this question:
True
False
Rate this question:
Worm
Trojan
Virus
Rootkit
None of the above
Rate this question:
Profit
Religious / political / ethical reasons
“Mount Everest” syndrome
Revenge
All of the above
Rate this question:
Confidentiality
Ease of Use
Availability
Integrity
Accountability
Rate this question:
Supplying your identity
Confirming your identify with an element unique to the individual
Using your identity to assign access rights
Tracking what users are doing while accessing the systems
None of the above
Rate this question:
Availability
Confidentiality
Integrity
Accountability
Ease of Use
Rate this question:
Active, Passive
Passive, Active
Active, Submissive
Positive, Active
None of the above
Rate this question:
Check & report on network error conditions
Generate networking stats
Control traffic flow across networks
Track end-to-end connectivity
None of the above
Rate this question:
True
False
Rate this question:
Low physical security
Active services
Open ports
The human element
Bad passwords
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Nmap -sP 192.168.1.1
Nmap -sX 192.168.1.1
Nmap -sU 192.168.1.1
Nmap -sN 192.168.1.1
Nmap -sC 192.168.1.1
Exploit
Vulnerability
Threat
Risk
Hole
Rate this question:
Something used to shutdown a system
A threat turned into a vulnerability
A flaw in the system
Anything that can be used to compromise a system
None of the above
Rate this question:
Identification
Granularity
Authentication
Authorization
Accountability
Rate this question:
Token-based authentication
Password authentication
Biometric authentication
Multi-factor authentication
None of the above
Rate this question:
Authorization
Authentication
Verification
Identification
Clarification
Rate this question:
An initial sequence number of its own and an acknowledgement number of 145678914
An initial sequence number of its own and no acknowledgement number since no data was received
An acknowledgment number of 145678914
An acknowledgement number of 145678913
An initial
Rate this question:
Worm
Trojan
Virus
Rootkit
None of the above
Rate this question:
TCP
UDP
IP
ICMP
None of the above
Rate this question:
ICMP
TCP
UDP
FTP
None of the above
Rate this question:
Nmap
Snort
Nessus
Nmap
Tcpdump
Rate this question:
Low threat, low vulnerability
Low threat, high vulnerability
High threat, low vulnerability
High threat, high vulnerability
None of the above
Rate this question:
SYN Stealth Open Port scan from Nmap
XMAS Open Port scan from Nmap
Hacker trying to identify the service running on a port
TCP/IP stack has failed
None of the above
Rate this question:
Confidentiality
Availability
Integrity
Accountability
Disclosure
Rate this question:
Over the Internet
Over the LAN
Locally
Offline
Ignorance
Rate this question:
IP header content
Protocol header (TCP, UDP, ICMP, etc) content
Payload
MAC Address
All of the above
Rate this question:
Internet
Network
Transport
Physical
Application
Rate this question:
Separation of Privileges
Principle of Least Privileges
Defense in Depth
Security through obscurity
All of the above
Rate this question:
Source and Destination IP
Source and Destination port
Sequence Number
Connection Number
A & B only
Rate this question:
Protocol (TCP, UDP, ICMP, etc) header
IP header
Payload
MAC header
None of the above
Rate this question:
Listening
Active
Promiscuous
Normal
None of the above
Rate this question:
Ping
Traceroute
Route
Nmap
None of the above
Rate this question:
SYN Flag
Payload Flag
FIN Flag
ACK Flag
RST Flag
Rate this question:
The router closest to the destination
Any router along the path when the MTU changes to permit a larger datagram
By the destination host
By the application processing the information datagram
None of the above
Rate this question:
Hole
Vulnerability
Risk
Compromise
Threat
Rate this question:
Physical Security
Information Security
Resources Management
Asset Security
Backups
Rate this question:
Security, Integrity, Functionality
Security, Ease of Use, Functionality
Availability, Ease of Use, Functionality
Confidentiality, Security, Ease of Use
Confidentiality, Integrity, Availability
Rate this question:
IP
UDP
TCP
ICMP
None of the above
Rate this question:
Ping
Snort
Nessus
Ethereal
Tcpdump
Rate this question:
Destruction
Integrity
Alteration
Disclosure
Confidentiality
Rate this question:
Search the Web for e-mail addresses of IT employees
Connect via telnet to the company’s Web server
Ping the URL and analyze the ICMP messages
Use the ipconfig /os command
None of the above
Rate this question:
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.