SCOO certification quiz for security plus test test and retest
3389
8080
636
53
Rate this question:
Remote authentication
Remote access policy
Virtual Private Networking (VPN)
Terminal access control
Rate this question:
A user in one building logs on to the server in the same building
A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN.
A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair.
A user in one city logs onto a network in another city
Rate this question:
Port 49
Port 161
Port 21
Port 53
Rate this question:
Are used to make connections between private networks across a public network, such as the Internet
Is an older protocol that was used in early remove access environments
It allows credentials to be accepted from multiple methods, including Kerberos
Has largely replaced SLIP and offers multiple protocol support including AppleTalk, IPX, and DECnet
AES
L2TP
PPTP
HTTPS
Rate this question:
RADIUS (Remote Authentication Dial-In User Service)
SLIP (Serial Line Internet Protocol)
PPP (Point to Point Protocol)
VPN
Rate this question:
Security Tokens
Certificates
Kerberos
CHAP
Rate this question:
Change the user’s subnet mask
Open the port on the user’s personal software firewall
Open the port on the company’s firewall
Open the port on the VLAN
Rate this question:
RADIUS because it encrypts client-server passwords
TACACS because it encrypt client-server negotiation dialogs
TACACS because it is a remote access authentication service
RADIUS because it is a remote access authentication service
Rate this question:
An intranet
The Internet
A network interface card
A modem
Rate this question:
CHAP
L2TP
Kerberos
RADIUS
Rate this question:
At the stage when the connection is established and when the connection is disconnected
At the stage when the connection is established and at which ever time after the connection has been established
At the stage when the connection is established
At the stage when the connection is disconnected
Rate this question:
3DES
SHA
IKE
AES
Rate this question:
It is primarily a point-to-point protocol
It supports encapsulation in a single point-to-point environment
It is a tunneling protocol originally designed for UNIX systems
It was created by Cisco as a method of creating tunnels primarily for dial-up connections
Rate this question:
Is an older protocol that was used in early remote access environments
Are used to make connections between private networks across a public network, such as the Internet
Is a mechanism that allows authentication of dial-in and other network connections
Has largely replaced SLIP and offers multiple protocol support including AppleTalk, IPX, and DECnet
Rate this question:
RADIUS because it encrypts client-server passwords
TACACS because it encrypts client-server negotiation dialogs
TACACS because it is a remote access authentication service
RADIUS because it is a remote access authentication service
Rate this question:
PPTP
L2TP
PPPoE
IPSec
Rate this question:
DNS
SOCKS
NAT
Private addressing
Rate this question:
PPP (Point-to-Point Protocol)
SLIP (Serial Line Internet Protocol)
L2TP (Layer Two Tunneling Protocol)
SMTP (Simple Mail Transfer Protocol
PPTP (Point-to-Point Tunneling Protocol)
Rate this question:
Makes use of a port used specifically for messages to be sent through
Detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail
Forms a platform on which messages are sent
Notify you that a message carries a virus
Rate this question:
The administrator account was not secured
X.400 connectors have not been password protected
Anonymous relays have not been disabled
Remote access to the email application’s install directory has not been removed
Rate this question:
Uses weak encryption
Communications are open and unprotected
Communications are a drain on bandwidth
Has no common protocol
Rate this question:
Web proxy
Trojan horse programs
Man in the middle attacks
Open relays
Rate this question:
Trojan Horse
Repudiation Attack
Polymorphic Virus
Phage Virus
Rate this question:
Install an ACL on the firewall to block traffic from the sender and filter the IP address
Configure rules on the users host and restart the host
Install an anti-spam filter on the domain mail servers and filter the email address
Configure a rule in each users router and restart the router
Rate this question:
A user must trust the public key that is received
Weak encryption can be easily broken
Private keys can be compromised
It is subject to a man-in-the-middle attack
Rate this question:
Spam and anti-virus filters should be used
Regular updates should be performed
Preview screens should be disabled
Email client features should be disabled
Rate this question:
A third party mail relay limits access to specific users
Spammers can utilize the third party mail relay
A third party mail relay restricts spammers from gaining access
A third party mail relay restricts the types of email that may be sent
Rate this question:
S/MIME expedites the delivery of email messages
S/MIME allows users to send both encrypted an digitally signed email messages
S/MIME allows users to send email messages with a return receipt
S/MIME allows users to send anonymous email messages
Rate this question:
Viruses
Spam
Adware
Spyware
Rate this question:
DNS
Web
FTP
Rate this question:
Data leakage
Cookies
Multiple streams
Licensing
Rate this question:
FTP is a protocol, a client, and a server
As discussed earlier, SSH is a program that allows connections to be secured by encrypting the session between the client and the server
Security was based on the honor system
When files are stored on a workstation, the connection is referred to as a peer-to-peer connection
Rate this question:
110
143
194
3389
49
Rate this question:
Application
Transport
Session
Network
Rate this question:
Object oriented coding
Rapid Application Development (RAD)
Cross-site scripting
Input validation
Rate this question:
The client browser must have the ability to run Java applets in a virtual machine on the client
It can also include a digital signature to verify authenticity
It is a programming language that allows access to system resources of the system running the script
It allows customized controls, icons, and other features to increase the usability of web enabled systems
Rate this question:
Spam
Brute force
Buffer overflow
Birthday
Rate this question:
Sandbox
Honey pot
VLAN
Quarantine
Rate this question:
Contact Thawte or Versign and ask about the web page
Contact the web page’s web master
Right click on the lock at the bottom of the browser and check the certificate information
Ensure that the web URL starts with ‘https://’
Rate this question:
Pop-up blocker
Anti-spyware
Local firewall
Password expiration
Rate this question:
SSL
Access Control List (ACL)
Media Access Control (MAC)
TCP
Rate this question:
Block all Domain Name Service (DNS) requests coming into the server.
Apply the most recent manufacturer updates and patches to the server
Enable auditing on the web server and periodically review the audit logs.
Use packet sniffing software on all inbound communications
Rate this question:
Port 443 outbound
Port 80 inbound
Port 80 outbound
Port 443 inbound
Rate this question:
Implement a policy to minimize the problem
Use Java virtual machines to reduce impact
Install a NIDS
Disable unauthorized ActiveX controls
Rate this question:
Vulnerability assessment
Penetration testing
SQL servers
Network mapping
Rate this question:
Recovery key
Public key
Keylogger
Session key
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.