IT Computer Security Quiz Questions

  • CISSP
  • CompTIA Security+
  • ISO/IEC 27001
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sickfredo
S
Sickfredo
Community Contributor
Quizzes Created: 3 | Total Attempts: 304
| Attempts: 171 | Questions: 68
Please wait...
Question 1 / 68
0 %
0/100
Score 0/100
1. A friend lends you the latest music CD he just purchased. You take it home and make a
copy for your own use. Have you broken any laws?

Explanation

Yes, making a copy of a music CD without the permission of the copyright holder is considered copyright infringement and is against the law.

Submit
Please wait...
About This Quiz
IT Computer SecurITy Quiz Questions - Quiz

(These quizzes were derived from the ITS curriculum at algonquin college in order to help with study of material. These quizzes, in no way represent the curriculum as a whole. Is just a gathering of information to help you study)

2. Vulnerability is defined as a way that an attacker could use to get into the system

Explanation

The statement accurately defines vulnerability as a means for an attacker to gain unauthorized access to a system. A vulnerability refers to a weakness or flaw in the system's security measures that can be exploited by an attacker to compromise the system's integrity, confidentiality, or availability. Therefore, the correct answer is "True."

Submit
3. A closed port responds to a SYN Packet with a(n) ___packet

Explanation

A closed port responds to a SYN Packet with an RST packet. When a SYN packet is sent to a closed port, the receiving system will respond with an RST (reset) packet to indicate that the port is closed and not accepting connections. This helps in quickly identifying closed ports during network scanning or connection attempts. The variations in capitalization (RST, rst, Rst) do not affect the meaning or correctness of the answer.

Submit
4.
  It is not possible to notice someone using a packet sniffer on the network.

Explanation

This statement is false because it is possible to notice someone using a packet sniffer on the network. A packet sniffer is a tool used to capture and analyze network traffic, and there are various ways to detect its presence. Network administrators can monitor network traffic for suspicious activity, such as an unusually high number of packets being captured or unusual patterns in the captured data. Additionally, network security measures can be implemented to detect and block packet sniffers on the network.

Submit
5. Physical dangers - i.e. earthquakes, flooding - are not considered a security concern.

Explanation

Physical dangers such as earthquakes and flooding can indeed be considered a security concern. While they may not directly relate to issues of personal safety or protection from intentional harm, they can still pose significant risks to individuals, communities, and even national security. For example, natural disasters can disrupt critical infrastructure, lead to loss of life and property, create social unrest, and even provide opportunities for malicious actors to exploit vulnerabilities. Therefore, it is incorrect to say that physical dangers are not considered a security concern.

Submit
6. It is possible to capture packets that are not destined for your machine.

Explanation

It is possible to capture packets that are not destined for your machine because of the way network protocols work. When packets are sent over a network, they are often broadcasted or sent to multiple devices. Network sniffing tools can intercept and capture these packets, allowing users to analyze the network traffic and potentially capture packets that are not intended for their own machine.

Submit
7. In security environments, Authentication refers to:

Explanation

Authentication in security environments refers to the process of confirming an individual's identity with a unique element. This unique element could be a password, a fingerprint, a smart card, or any other factor that is specific to the individual. By confirming the identity, the system ensures that the user is who they claim to be before granting access to resources or assigning access rights.

Submit
8. Packet sniffers cannot read / interpret the payload in a packet for you.

Explanation

Packet sniffers are tools used to capture and analyze network traffic. They can intercept and display the contents of packets, including the payload. Therefore, the statement that packet sniffers cannot read or interpret the payload in a packet is false. Packet sniffers are specifically designed to capture and analyze the data within packets, allowing users to examine the contents and analyze network communication.

Submit
9. Which one of the following is NOT a fundamental principle of the Computer Security Triad?

Explanation

The Computer Security Triad consists of three fundamental principles: confidentiality, integrity, and availability. These principles are essential for ensuring the security of computer systems and data. Ease of use, on the other hand, is not a fundamental principle of the triad. While it is important to consider usability in the design and implementation of security measures, it is not one of the core principles that the triad focuses on.

Submit
10. The ICMP protocol is specifically designed to:

Explanation

The ICMP protocol, or Internet Control Message Protocol, is specifically designed to check and report on network error conditions. It is used by network devices to send error messages and operational information, allowing for the detection and reporting of issues such as unreachable hosts, network congestion, or routing problems. ICMP helps in troubleshooting and diagnosing network problems by providing feedback about the status and errors occurring within a network.

Submit
11.

  Which of the following is considered a reason why hackers attack systems?

Explanation

Hackers attack systems for various reasons, including profit, religious/political/ethical motivations, the "Mount Everest" syndrome (the desire to conquer a challenging target), and revenge. These motivations can drive hackers to exploit vulnerabilities in systems and gain unauthorized access, causing damage, stealing sensitive information, or disrupting services. The combination of these different reasons makes it difficult to pinpoint a single motive for hacking, as hackers can be driven by a mix of financial gain, personal beliefs, and personal vendettas.

Submit
12. A threat becomes a risk only when it is identified as being linked to a specific vulnerability

Explanation

When a threat is identified as being linked to a specific vulnerability, it becomes a risk. This means that the potential harm or damage that the threat can cause is now more likely to occur because there is a vulnerability that can be exploited. Without the identification of a vulnerability, the threat remains just a potential danger without a high likelihood of actually causing harm. Therefore, the statement "A threat becomes a risk only when it is identified as being linked to a specific vulnerability" is true.

Submit
13. A ___ attaches itself to a program or file so it can spread from one computer to another
with the file as it travels, leaving infections as it travels.

Explanation

A virus is a type of malicious software that attaches itself to a program or file and spreads from one computer to another. As it travels, it leaves infections in the files it infects. Unlike worms or Trojans, viruses require a host file or program to propagate and cannot spread on their own. Rootkits, on the other hand, are a type of malware that allows unauthorized access to a computer system, but they do not spread like viruses. Therefore, the correct answer is virus.

Submit
14. It is not possible to map out a network, its resources and how they are connected without physical access to the resources themselves

Explanation

The statement is false because it is possible to map out a network, its resources, and how they are connected without physical access to the resources themselves. This can be done through various network mapping techniques such as network scanning, network discovery tools, and network monitoring software. These methods allow network administrators to gather information about the network topology, devices, and connections remotely, without the need for physical access to the resources.

Submit
15. Of all the vulnerabilities listed below, which one is considered the hardest to properly
protect against?

Explanation

The human element is considered the hardest vulnerability to properly protect against because humans are susceptible to making mistakes, being manipulated, or intentionally causing security breaches. Unlike technical vulnerabilities like open ports or bad passwords, which can be addressed through technological solutions, the human element involves unpredictable behavior and requires a combination of training, awareness, and ongoing monitoring to mitigate the risks.

Submit
16. ___ reconnaissance is used by hackers for observing and learning about the target from
afar, while _____ reconnaissance is used to gain more active and direct knowledge of the
target.

Explanation

Passive reconnaissance is used by hackers to observe and gather information about the target without directly interacting with it. This can include activities such as scanning networks, collecting publicly available information, or monitoring communication channels. On the other hand, active reconnaissance involves more direct and aggressive techniques to gain knowledge about the target. This can include activities such as port scanning, vulnerability scanning, or attempting to exploit weaknesses in the target's security.

Submit
17. Which of the CIA Triad elements is responsible for ensuring that personal information is not
disclosed to unauthorized users?

Explanation

Confidentiality is responsible for ensuring that personal information is not disclosed to unauthorized users. It involves protecting sensitive data from being accessed, viewed, or disclosed by unauthorized individuals. Confidentiality measures, such as encryption, access controls, and secure transmission protocols, are implemented to safeguard personal information and maintain privacy.

Submit
18. Which of the following command lines would you use to conduct a Christmas scan using
nmap?

Explanation

not-available-via-ai

Submit
19. Computer A wishes to open a TCP session with Computer B. If Computer A's initial
sequence number is 145678913, then Computer B will respond with:

Explanation

Computer B will respond with an initial sequence number of its own and an acknowledgement number of 145678914. This is because in a TCP session, both computers need to establish synchronization by exchanging initial sequence numbers. Computer B generates its own initial sequence number and acknowledges the receipt of Computer A's initial sequence number by sending an acknowledgement number.

Submit
20. Which of the authentication methods below will ensure the strongest degree of authentication to access a system?

Explanation

Multi-factor authentication ensures the strongest degree of authentication to access a system because it requires multiple forms of identification to verify the user's identity. This typically includes a combination of something the user knows (such as a password), something the user has (such as a token or smart card), and something the user is (such as a fingerprint or iris scan). By requiring multiple factors, it significantly increases the security of the authentication process and reduces the risk of unauthorized access.

Submit
21. A weakness in a computer system, or a point where the system is susceptible to attack.
The weakness could be exploited to violate system security. This is the definition of a(n)

Explanation

A vulnerability refers to a weakness in a computer system that can be exploited by attackers to compromise its security. It represents a point of susceptibility where an attacker can gain unauthorized access, steal data, or disrupt system operations. Identifying and addressing vulnerabilities is crucial to maintaining the security and integrity of computer systems.

Submit
22.
Which of the following is NOT a security mechanism that can be used to support the 3 elements of the CIA Triad?

Explanation

Granularity is not a security mechanism that can be used to support the elements of the CIA Triad. The CIA Triad consists of three components - confidentiality, integrity, and availability - which are essential for information security. Identification, authentication, authorization, and accountability are all security mechanisms that can be used to support these elements. Granularity, on the other hand, refers to the level of detail or precision in which something is measured or controlled, and it is not directly related to the CIA Triad or information security.

Submit
23. IUA small company is looking to implement a protocol to exchange large financial transaction information on a semi-regular basis. Their primary concern is security, with performance being a close second. Which protocol should they implement?

Explanation

The small company should implement TCP (Transmission Control Protocol) because it provides reliable and secure communication by establishing a connection, ensuring data integrity, and retransmitting lost packets. TCP also offers flow control and congestion control mechanisms to optimize performance. UDP (User Datagram Protocol) does not guarantee reliable transmission or security, making it unsuitable for large financial transactions. IP (Internet Protocol) is a network layer protocol and ICMP (Internet Control Message Protocol) is used for network troubleshooting, so they are not suitable for the company's requirements. Therefore, TCP is the best choice for the company's needs.

Submit
24. Which of the following security goals provides a means for objective verification of a user’s
identity?

Explanation

Authentication is the correct answer because it refers to the process of verifying the identity of a user. It provides a means for objective verification by confirming that the user is who they claim to be, typically through the use of passwords, biometrics, or other security measures. Authentication is essential for ensuring that only authorized individuals can access sensitive information or perform certain actions, thereby enhancing the overall security of a system or network.

Submit
25.
   A security exploit is defined as:

Explanation

A security exploit refers to any method, technique, or tool that can be utilized to compromise or breach the security of a system. It can encompass various forms such as software vulnerabilities, hardware weaknesses, social engineering tactics, or even physical attacks. This broad definition includes all possible means by which an attacker can gain unauthorized access, steal information, disrupt operations, or cause harm to a system or its users.

Submit
26.
1.    Which one of the circumstances below poses a significant risk?

Explanation

High threat, high vulnerability poses a significant risk because it indicates a situation where there is a high likelihood of a threat occurring and a high potential for it to cause harm or damage. This combination increases the chances of negative consequences and the need for proactive measures to mitigate the risk.

Submit
27. ____ is a connectionless protocol

Explanation

UDP (User Datagram Protocol) is a connectionless protocol. Unlike TCP (Transmission Control Protocol), which establishes a connection between two devices before data transfer, UDP does not establish a connection and simply sends data packets without any guarantee of delivery or order. UDP is commonly used for applications that require low latency and can tolerate some data loss, such as streaming media, online gaming, and DNS (Domain Name System) queries.

Submit
28. ___ spread from computer to computer, but unlike the malware , it has the
ability to travel and replicate itself without any user intervention.
A- Worm
B- Trojan
C- Virus
D- Rootkit
E- None of the above

Explanation

A worm is a type of malware that can spread from computer to computer without any user intervention. Unlike viruses and trojans, worms do not require a host file or user action to replicate themselves. They can exploit vulnerabilities in network protocols or operating systems to automatically propagate and infect other systems. This makes worms particularly dangerous as they can quickly infect a large number of computers and cause widespread damage. In this case, the correct answer is A - Worm.

Submit
29. John received an e-mail from Suzy, but he wants to ensure that the content were not altered between the time Suzy sent it and John received it. What CIA Triad goal is John trying to achieve?

Explanation

John is trying to achieve the goal of integrity. The goal of integrity ensures that the content of the e-mail remains unchanged and unaltered during transmission from Suzy to John. It ensures that the information has not been tampered with, modified, or corrupted in any way.

Submit
30. Which of the tools below is designed as a vulnerability scanner?

Explanation

Nessus is designed as a vulnerability scanner. It is a widely used tool for identifying vulnerabilities in computer systems and networks. Nessus scans for known vulnerabilities and provides detailed reports on the findings. It helps organizations identify and address security weaknesses before they can be exploited by attackers.

Submit
31. Your system receives a few packets, but no connection seems to be established. When
you look at the logs, you notice you received a few SYN packets, immediately followed by
RST packets, but no ACK packets. What could be happening?

Explanation

The given correct answer suggests that the system is experiencing a SYN Stealth Open Port scan from Nmap. This type of scan involves sending a SYN packet to initiate a connection with the target system, but instead of completing the connection with an ACK packet, the attacker sends a RST packet to terminate the connection. This technique is used by hackers to identify open ports on a system without being detected.

Submit
32. When using a packet sniffer, what part(s) of the packet can you observe?
(Select all that apply)

Explanation

When using a packet sniffer, you can observe all of the above parts of the packet. A packet sniffer allows you to capture and analyze network traffic, and it provides visibility into various aspects of the packets. By using a packet sniffer, you can observe the IP header content, protocol header content (such as TCP, UDP, ICMP), payload, and MAC address. This allows you to analyze and understand the different layers and components of the network packets being transmitted.

Submit
33. In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a
media or wire.

Explanation

The Physical layer in the TCP/IP stack is responsible for physically moving electrons across a media or wire. This layer deals with the actual transmission of data bits over the network, including the electrical, mechanical, and functional aspects of the physical connection. It defines the specifications for cables, connectors, and other hardware components required for data transmission.

Submit
34. What security term, coined by the SANS institute, is used to represent the optimal
information security strategy?

Explanation

Defense in Depth is a security term used to represent the optimal information security strategy. It involves implementing multiple layers of security measures to protect against potential threats. This approach ensures that even if one layer is breached, there are additional layers in place to prevent unauthorized access and protect sensitive information. By implementing a combination of physical, technical, and administrative controls, organizations can create a strong defense system that reduces the risk of successful attacks. Separation of Privileges, Principle of Least Privileges, and Security through obscurity are also important security concepts but are not specifically synonymous with the optimal security strategy represented by Defense in Depth.

Submit
35. Each TCP connection is uniquely identified by:

Explanation

Each TCP connection is uniquely identified by the combination of the source and destination IP addresses and the source and destination port numbers. The IP addresses identify the source and destination devices, while the port numbers specify the specific application or service running on those devices. The sequence number and connection number are not used for uniquely identifying TCP connections.

Submit
36.
  Which of the following is not considered a category of exploit?

Explanation

Ignorance is not considered a category of exploit. Exploits are typically categorized based on the method or location of the attack. "Over the Internet," "Over the LAN," "Locally," and "Offline" are all categories that describe different ways in which an exploit can occur. However, "Ignorance" does not fit into any of these categories and is not a recognized category of exploit.

Submit
37. Which of the following software tools are not effective for security purposes?

Explanation

All of the given software tools (Ping, Traceroute, Route, Nmap) can be effective for security purposes. Ping can be used to check the availability of a host and detect any potential network issues, Traceroute can help identify the path that network packets take to reach a destination and detect any suspicious hops, Route can be used to view and manipulate the routing table of a network device, and Nmap is a powerful network scanning tool that can be used for security auditing and discovering vulnerabilities. Therefore, none of the above options are not effective for security purposes.

Submit
38. Which of the following is information security NOT concerned with?

Explanation

Information security is concerned with protecting the confidentiality, integrity, and availability of information. Resources management, on the other hand, focuses on efficiently and effectively managing an organization's resources, such as personnel, finances, and equipment. While information security is closely related to resources management, it is not solely concerned with it. Information security also includes other aspects such as risk management, incident response, and security awareness training. Therefore, resources management is the correct answer as it is not directly related to information security.

Submit
39. You’ve captured a packet from the network using TCPDUMP, but it’s in raw hex format. Which of the following is the first part of the information in the packet concerned with?

Explanation

The correct answer is IP header. When capturing a packet using TCPDUMP, the packet is in raw hex format. The IP header is the first part of the packet that contains information such as the source and destination IP addresses, protocol version, packet length, and other important information about the IP packet.

Submit
40. The loss of one of the goals of security is known as a:

Explanation

Compromise refers to the loss of one of the goals of security, which is the protection of resources and data from unauthorized access, use, disclosure, disruption, modification, or destruction. When a compromise occurs, it means that the security measures in place have been breached, allowing an attacker to gain unauthorized access or control over the system, network, or data. This can lead to various negative consequences, such as data breaches, financial losses, reputational damage, and legal implications.

Submit
41. Security goals are a balancing act between 3 key elements. What are these elements?

Explanation

The three key elements in balancing security goals are security, ease of use, and functionality. Security ensures the protection of data and systems from unauthorized access or attacks. Ease of use focuses on making security measures user-friendly and convenient for individuals to use. Functionality ensures that security measures do not hinder the proper functioning and performance of systems and processes. Balancing these three elements is crucial in designing effective and efficient security measures that meet the needs of users while maintaining the integrity and availability of data and systems.

Submit
42. Which of the software tools below is considered an Intrusion Detection System?

Explanation

Snort is considered an Intrusion Detection System (IDS) because it is an open-source network intrusion prevention and detection system. It analyzes network traffic in real-time, looking for patterns and signatures of known attacks. It can also be configured to generate alerts or take action when suspicious activity is detected. Snort is widely used in the cybersecurity industry as an effective tool for monitoring and protecting network systems against various types of intrusions and attacks.

Submit
43. In order for a packet sniffer to work properly, it needs to put the NIC card into _____ mode.

Explanation

A packet sniffer needs to put the NIC card into promiscuous mode in order to work properly. This mode allows the network interface card to capture all network traffic, including packets that are not intended for the device. By enabling promiscuous mode, the packet sniffer can analyze and capture all network packets passing through the network, regardless of their destination. This is essential for monitoring and analyzing network traffic for security or troubleshooting purposes.

Submit
44. The TCP three-way handshake used to open a TCP connection uses 3 packets.
What 2 flags are required to be set across these 3 packets? (Select all that apply)

Explanation

The TCP three-way handshake is a process used to establish a TCP connection between two devices. It involves the exchange of three packets. The SYN (synchronize) flag is set in the first packet sent by the client to the server to initiate the connection. The server responds with a packet that has both the SYN and ACK (acknowledge) flags set, indicating that it received the client's request and is willing to establish a connection. Finally, the client sends a packet with only the ACK flag set to acknowledge the server's response. Therefore, the two flags required to be set across these three packets are the SYN Flag and the ACK Flag.

Submit
45. A fragmented IP datagram is reassembled by

Explanation

A fragmented IP datagram is reassembled by the destination host. When a large IP datagram is fragmented into smaller pieces for transmission over a network, it is the responsibility of the destination host to receive and reassemble these fragments into the original datagram. This process is done using the identification field and fragment offset field in the IP header, which allow the destination host to correctly order and combine the fragments. The routers along the path only handle the forwarding of the individual fragments, while the application processing the information datagram is not involved in the reassembly process.

Submit
46. Based on the highlighted portion of the captured packet code below, what protocol is
identified as being used in the payload portion of this IP packet?

4500 0064 0000 4000 4017 b755 c0a8 0101

Explanation

The highlighted portion of the captured packet code "4017" indicates the protocol field in the IP header. In this case, the value "17" corresponds to the UDP (User Datagram Protocol) protocol. Therefore, the protocol identified as being used in the payload portion of this IP packet is UDP.

Submit
47.

Which one of the following mechanisms can hackers use to defeat Availability?

Explanation

Hackers can defeat Availability by using the mechanism of Destruction. This means they can intentionally destroy or disrupt the availability of a system, network, or service, making it inaccessible or unusable for legitimate users. This can be done through various methods such as launching a denial of service (DoS) attack, destroying physical infrastructure, or deleting critical data. By causing destruction, hackers can effectively prevent users from accessing or using the targeted resource, compromising its availability.

Submit
48. Which of the following is one method of gathering information about the operating system a
company is using?

Explanation

Connecting via telnet to the company's web server is one method of gathering information about the operating system a company is using. By connecting through telnet, one can access the command-line interface of the web server and gather information about the operating system running on it. This method allows for direct interaction with the server and can provide valuable information about the underlying technology being used.

Submit
49.
1.    The OSI layer which provides data encryption is the:





Explanation

The Presentation Layer in the OSI model is responsible for data encryption and decryption. It ensures that the data is properly formatted and encrypted before transmission, and decrypts it at the receiving end. This layer also handles data compression, encryption, and decryption algorithms, ensuring that the data is secure and can be understood by the receiving application.

Submit
50. Which of the CIA Triad elements is responsible for ensuring that legitimate users maintain access to information and resources they require access to?

Explanation

Availability is the element of the CIA Triad that ensures that legitimate users maintain access to information and resources they require access to. It focuses on making sure that the systems and data are accessible and usable when needed, preventing any disruptions or downtime that could hinder the users' ability to access the necessary information. This includes implementing measures such as redundancy, backups, and disaster recovery plans to ensure continuous availability of resources.

Submit
51.
   In security environments, Accountability means:

Explanation

Accountability in security environments refers to the practice of tracking and monitoring the actions and behaviors of users while they are accessing systems. This helps to ensure that individuals can be held responsible for their actions and provides a record of their activities for auditing and investigation purposes. It involves keeping a log of user actions, monitoring system access, and maintaining records of user activity to ensure compliance with security policies and detect any unauthorized or malicious activities. This helps to maintain the integrity and security of the systems and hold users accountable for their actions.

Submit
52. In security environments, Identification is the process of:

Explanation

The correct answer is "Supplying your identity." In security environments, the process of identification involves providing or supplying your identity information to confirm who you are. This could include providing personal information such as your name, username, password, or any other unique identifier that helps establish your identity. Identification is an essential step in granting access rights and ensuring that individuals are authorized to access certain systems or resources. It is different from authentication, which verifies the validity of the supplied identity information.

Submit
53. Based on the highlighted portion of the captured packet code below, what protocol is
identified as being used in the payload portion of this IP packet?

4500 0064 0000 4000 4006 b755 c0a8 0101

Explanation

The correct answer is TCP because the hexadecimal code "06" in the captured packet represents the protocol field in the IP header, and "06" corresponds to TCP in the protocol number assignment.

Submit
54. If you run password crackers or packet sniffers at work, which of the following is true?

Explanation

It is important to obtain permission from management before running password crackers or packet sniffers at work. This is because these activities may be considered unauthorized and can potentially violate company policies or legal regulations. By obtaining permission, the employee ensures that they are acting within the boundaries set by the organization and can avoid any potential negative consequences.

Submit
55. Based on the highlighted portion of the captured packet code below, what protocol is
identified as being used in the payload portion of this IP packet?

4500 0064 0000 4000 4001 b755 c0a8 0101

Explanation

The highlighted portion of the captured packet code "4001" corresponds to the protocol field in the IP header. In this case, the value "4001" indicates that the protocol being used in the payload portion of this IP packet is ICMP (Internet Control Message Protocol).

Submit
56.
 ___ is considered a high-end packet sniffer, while ___ is a strong vulnerability scanner.

Explanation

Ethereal is considered a high-end packet sniffer because it is a powerful network protocol analyzer that can capture and analyze network traffic. Nessus, on the other hand, is a strong vulnerability scanner that can scan and identify vulnerabilities in computer systems and networks. Both tools serve different purposes in network security.

Submit
57. The TCP three-way handshake used to close a TCP connection uses 3 packets.
What 2 flags are required to be set across these 3 packets? (Select all that apply)

Explanation

The TCP three-way handshake is used to establish and terminate a TCP connection. In the case of closing a TCP connection, the FIN (Finish) flag is set across the three packets. This flag is used to indicate that the sender has finished sending data. Additionally, the ACK (Acknowledgment) flag is also required to be set across these three packets. The ACK flag is used to acknowledge the receipt of the FIN flag and confirm the termination of the connection. Therefore, the correct answer is FIN Flag, ACK Flag.

Submit
58. Which of the following statements about session hijacking is false?

Explanation

not-available-via-ai

Submit
59. Based on the highlighted portion of the captured packet code below, what network protocol
is being used?
4500 0064 0000 4000 4001 b755 c0a8 0101

Explanation

IPv4

Submit
60. In Security term, Authorization refers to:

Explanation

Authorization in security refers to the process of using an individual's identity to assign access rights. It involves granting or denying permissions to users based on their authenticated identity. This ensures that only authorized individuals can access certain resources or perform specific actions within a system. By assigning access rights based on identity, organizations can control and manage the level of access that users have to sensitive information or functionalities, thereby enhancing security and preventing unauthorized access.

Submit
61. What are the elements that make up the Hacker’s DAD Triad?

Disclosure
Denial of Service
Alteration
Destruction
Obscurity

Explanation

The Hacker's DAD Triad consists of three elements: Disclosure, Alteration, and Destruction. Disclosure refers to the unauthorized access and exposure of sensitive information. Alteration involves unauthorized changes or modifications to data or systems. Destruction refers to the intentional damage or deletion of data or systems. These elements represent the different objectives that hackers may have when targeting a system or network.

Submit
62. Captain Zap described the method he used to obtain user manuals to hack the AT&T
system. What method did he use?

Explanation

Captain Zap used the method of Dumpster Diving to obtain user manuals to hack the AT&T system. Dumpster Diving refers to the act of searching through trash or discarded items to find information or valuable items. In this case, Captain Zap likely searched through dumpsters or garbage bins to find discarded user manuals that contained the necessary information to carry out the hack.

Submit
63.
 Which one of the following software tools is considered to be a packet sniffer?
(Select all that apply)

Explanation

Snort, Ethereal, and Tcpdump are considered to be packet sniffers. A packet sniffer is a tool used to capture and analyze network traffic. Snort is an open-source intrusion detection system that can also be used as a packet sniffer. Ethereal, now known as Wireshark, is a popular network protocol analyzer that can capture and analyze packets. Tcpdump is a command-line packet analyzer that can capture and display network traffic. Ping and Nmap are not packet sniffers, as they are used for network troubleshooting and scanning, respectively.

Submit
64. Qui
Which of the CIA Triad elements is responsible for ensuring that information is not disclosed to unauthorized users?

Explanation

Integrity is the correct answer because it ensures that information remains accurate, complete, and trustworthy. While confidentiality protects information from being accessed by unauthorized users, integrity ensures that the information has not been tampered with or altered in any unauthorized way. It focuses on maintaining the consistency and reliability of data, preventing unauthorized modifications or deletions, and ensuring that the information remains intact and trustworthy.

Submit
65. Define the term “Authorisation” as defined by Security principles

Explanation

Mechanism to decide/assign the access level granted to the user/system
(1) Controls what systems, resources and data the user can access
(2) Must be closely tied to the authentication process
(3) Generally more of a background process managed by administrators

Submit
66. What was Captain Zap’s hack of the AT&T system? (What did he do?)

Explanation

He changed the system clocks on the billing servers by 12 hours, which resulted
in reducing long-distance charges for users. This is due to the fact that, at the
time, AT&T had different rates for long-distance for daytime (higher) and evening
(lower).

Submit
67. Define the concept of Least Privileges?

Explanation

Every security subject (user, process, resource, etc) should only have the
minimum permissions/access required to accomplish its assigned task

Submit
68. What are the 3 main types of security?

Explanation

A. System Security
i) Protection of information, capabilities and services on a system/server
(1) SANs, servers, desktops, network devices, etc…
B. Communication Security
i) Protection of information while it’s being transmitted
(1) Also includes protection of the medium itself (in so far as it’s possible)
C. Physical Security
i) Protection from physical access to computer, communications equipment,
facilities and personnel from damage or theft
(1) All logical security controls must include physical security

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 25, 2010
    Quiz Created by
    Sickfredo
Cancel
  • All
    All (68)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A friend lends you the latest music CD he just purchased. You take it...
Vulnerability is defined as a way that an ...
A closed port responds to a SYN Packet with a(n) ___packet
  ...
Physical dangers - i.e. earthquakes, flooding - are not considered a...
It is possible to capture packets that are not ...
In security environments, Authentication refers to:
Packet sniffers cannot read / interpret the ...
Which one of the following is NOT a fundamental principle of the...
The ICMP protocol is specifically designed to:
  ...
A threat becomes a risk only when it is ...
A ___ attaches itself to a program or file so it can spread from one...
It is not possible to map out a network, its ...
Of all the vulnerabilities listed below, which one is considered the...
___ reconnaissance is used by hackers for observing and learning about...
Which of the CIA Triad elements is responsible for ensuring that...
Which of the following command lines would you use to conduct a...
Computer A wishes to open a TCP session with Computer B. If Computer...
Which of the authentication methods below will ...
A weakness in a computer system, or a point where the system is...
Which of the following is NOT a security ...
IUA small company is looking to implement a protocol to exchange large...
Which of the following security goals provides a means for objective...
   A security exploit is defined as:
1.    ...
____ is a connectionless protocol
___ spread from computer to computer, but unlike the malware , it has...
John received an e-mail from Suzy, but he wants ...
Which of the tools below is designed as a vulnerability scanner?
Your system receives a few packets, but no connection seems to be...
When using a packet sniffer, what part(s) of the packet can you...
In the TCP/IP stack, the ____ layer is concerned with physically...
What security term, coined by the SANS institute, is used to represent...
Each TCP connection is uniquely identified by:
  ...
Which of the following software tools are not ...
Which of the following is information security NOT concerned with?
You’ve captured a packet from the network using ...
The loss of one of the goals of security is known as a:
Security goals are a balancing act between 3 key elements. What are...
Which of the software tools below is considered an Intrusion Detection...
In order for a packet sniffer to work properly, it needs to put the...
The TCP three-way handshake used to open a TCP connection uses 3...
A fragmented IP datagram is reassembled by
Based on the highlighted portion of the captured packet code below,...
Which one of the following mechanisms can hackers ...
Which of the following is one method of gathering information about...
1.    ...
Which of the CIA Triad elements is responsible for ensuring that...
   In security environments, Accountability means:
In security environments, Identification is the process of:
Based on the highlighted portion of the captured packet code below,...
If you run password crackers or packet sniffers at work, which of the...
Based on the highlighted portion of the captured packet code below,...
 ___ is considered a high-end packet ...
The TCP three-way handshake used to close a TCP connection uses 3...
Which of the following statements about session hijacking is false?
Based on the highlighted portion of the captured packet code below,...
In Security term, Authorization refers to:
What are the elements that make up the Hacker’s ...
Captain Zap described the method he used to obtain user manuals to...
 Which one of the following software tools ...
Qui ...
Define the term “Authorisation” as defined by Security principles
What was Captain Zap’s hack of the AT&T system? (What did he...
Define the concept of Least Privileges?
What are the 3 main types of security?
Alert!

Advertisement