IT Computer Security Quiz Questions

68 Questions | Total Attempts: 117

SettingsSettingsSettings
IT Computer SecurITy Quiz Questions - Quiz

(These quizzes were derived from the ITS curriculum at algonquin college in order to help with study of material. These quizzes, in no way represent the curriculum as a whole. Is just a gathering of information to help you study)


Questions and Answers
  • 1. 
    Based on the highlighted portion of the captured packet code below, what protocol isidentified as being used in the payload portion of this IP packet?4500 0064 0000 4000 4006 b755 c0a8 0101
    • A. 

      IP

    • B. 

      UDP

    • C. 

      TCP

    • D. 

      ICMP

    • E. 

      None of the above

  • 2. 
    Which one of the following is NOT a fundamental principle of the Computer Security Triad?
    • A. 

      Confidentiality

    • B. 

      Ease of Use

    • C. 

      Availability

    • D. 

      Integrity

    • E. 

      Accountability

  • 3. 
    Based on the highlighted portion of the captured packet code below, what protocol isidentified as being used in the payload portion of this IP packet?4500 0064 0000 4000 4001 b755 c0a8 0101
    • A. 

      IP

    • B. 

      UDP

    • C. 

      TCP

    • D. 

      ICMP

    • E. 

      None of the above

  • 4. 
    In security environments, Authentication refers to:
    • A. 

      Supplying your identity

    • B. 

      Confirming your identify with an element unique to the individual

    • C. 

      Using your identity to assign access rights

    • D. 

      Tracking what users are doing while accessing the systems

    • E. 

      None of the above

  • 5. 
    Security goals are a balancing act between 3 key elements. What are these elements?
    • A. 

      Security, Integrity, Functionality

    • B. 

      Security, Ease of Use, Functionality

    • C. 

      Availability, Ease of Use, Functionality

    • D. 

      Confidentiality, Security, Ease of Use

    • E. 

      Confidentiality, Integrity, Availability

  • 6. 
    The TCP three-way handshake used to open a TCP connection uses 3 packets.What 2 flags are required to be set across these 3 packets? (Select all that apply)
    • A. 

      SYN Flag

    • B. 

      Payload Flag

    • C. 

      FIN Flag

    • D. 

      ACK Flag

    • E. 

      RST Flag

  • 7. 
    Based on the highlighted portion of the captured packet code below, what protocol isidentified as being used in the payload portion of this IP packet?4500 0064 0000 4000 4017 b755 c0a8 0101
    • A. 

      IP

    • B. 

      UDP

    • C. 

      TCP

    • D. 

      ICMP

    • E. 

      None of the above

  • 8. 
    Of all the vulnerabilities listed below, which one is considered the hardest to properlyprotect against?
    • A. 

      Low physical security

    • B. 

      Active services

    • C. 

      Open ports

    • D. 

      The human element

    • E. 

      Bad passwords

  • 9. 
    Which of the tools below is designed as a vulnerability scanner?
    • A. 

      Nmap

    • B. 

      Snort

    • C. 

      Nessus

    • D. 

      Nmap

    • E. 

      Tcpdump

  • 10. 
    What security term, coined by the SANS institute, is used to represent the optimalinformation security strategy?
    • A. 

      Separation of Privileges

    • B. 

      Principle of Least Privileges

    • C. 

      Defense in Depth

    • D. 

      Security through obscurity

    • E. 

      All of the above

  • 11. 
    Which of the CIA Triad elements is responsible for ensuring that personal information is notdisclosed to unauthorized users?
    • A. 

      Availability

    • B. 

      Confidentiality

    • C. 

      Integrity

    • D. 

      Accountability

    • E. 

      Ease of Use

  • 12. 
    ___ reconnaissance is used by hackers for observing and learning about the target fromafar, while _____ reconnaissance is used to gain more active and direct knowledge of thetarget.
    • A. 

      Active, Passive

    • B. 

      Passive, Active

    • C. 

      Active, Submissive

    • D. 

      Positive, Active

    • E. 

      None of the above

  • 13. 
    Which of the software tools below is considered an Intrusion Detection System?
    • A. 

      Ping

    • B. 

      Snort

    • C. 

      Nessus

    • D. 

      Ethereal

    • E. 

      Tcpdump

  • 14. 
    When using a packet sniffer, what part(s) of the packet can you observe?(Select all that apply)
    • A. 

      IP header content

    • B. 

      Protocol header (TCP, UDP, ICMP, etc) content

    • C. 

      Payload

    • D. 

      MAC Address

    • E. 

      All of the above

  • 15. 
    The TCP three-way handshake used to close a TCP connection uses 3 packets.What 2 flags are required to be set across these 3 packets? (Select all that apply)
    • A. 

      SYN Flag

    • B. 

      Payload Flag

    • C. 

      FIN Flag

    • D. 

      ACK Flag

    • E. 

      RST Flag

  • 16. 
    Based on the highlighted portion of the captured packet code below, what network protocolis being used?4500 0064 0000 4000 4001 b755 c0a8 0101
    • A. 

      TCP

    • B. 

      ICMP

    • C. 

      UDP

    • D. 

      IP

    • E. 

      ARP

  • 17. 
    Which of the following security goals provides a means for objective verification of a user’sidentity?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Verification

    • D. 

      Identification

    • E. 

      Clarification

  • 18. 
    The ICMP protocol is specifically designed to:
    • A. 

      Check & report on network error conditions

    • B. 

      Generate networking stats

    • C. 

      Control traffic flow across networks

    • D. 

      Track end-to-end connectivity

    • E. 

      None of the above

  • 19. 
    A friend lends you the latest music CD he just purchased. You take it home and make acopy for your own use. Have you broken any laws?
    • A. 

      Yes

    • B. 

      No

  • 20. 
    If you run password crackers or packet sniffers at work, which of the following is true?
    • A. 

      Encrypt or Destroy cracked passwords

    • B. 

      E-mail users using inappropriate software on the network to inform them you know

    • C. 

      Don't crack passwords that meet the company's password policy

    • D. 

      Get permission from management first

    • E. 

      All of the above

  • 21. 
    Computer A wishes to open a TCP session with Computer B. If Computer A's initialsequence number is 145678913, then Computer B will respond with:
    • A. 

      An initial sequence number of its own and an acknowledgement number of 145678914

    • B. 

      An initial sequence number of its own and no acknowledgement number since no data was received

    • C. 

      An acknowledgment number of 145678914

    • D. 

      An acknowledgement number of 145678913

    • E. 

      An initial

  • 22. 
    Your system receives a few packets, but no connection seems to be established. Whenyou look at the logs, you notice you received a few SYN packets, immediately followed byRST packets, but no ACK packets. What could be happening?
    • A. 

      SYN Stealth Open Port scan from Nmap

    • B. 

      XMAS Open Port scan from Nmap

    • C. 

      Hacker trying to identify the service running on a port

    • D. 

      TCP/IP stack has failed

    • E. 

      None of the above

  • 23. 
    Which of the following command lines would you use to conduct a Christmas scan usingnmap?
    • A. 

      Nmap -sP 192.168.1.1

    • B. 

      Nmap -sX 192.168.1.1

    • C. 

      Nmap -sU 192.168.1.1

    • D. 

      Nmap -sN 192.168.1.1

    • E. 

      Nmap -sC 192.168.1.1

  • 24. 
    Captain Zap described the method he used to obtain user manuals to hack the AT&Tsystem. What method did he use?
    • A. 

      Theft – he broke in and stole them

    • B. 

      He bought them at a sale at his local electronics store

    • C. 

      Dumpster Diving

    • D. 

      Social Engineering

    • E. 

      Sniffing the network

  • 25. 
    A weakness in a computer system, or a point where the system is susceptible to attack.The weakness could be exploited to violate system security. This is the definition of a(n)
    • A. 

      Exploit

    • B. 

      Vulnerability

    • C. 

      Threat

    • D. 

      Risk

    • E. 

      Hole

Back to Top Back to top