As an innovative company, SEC Technologies is continuously working on game-changing solutions to protect government agencies, organizations and companies of all sizes and industries against the increasing number of cyber-attacks.
This is a Cyber Security Quiz about SEC Technologies and Tools!
(A) NAC
(B) DMZ
(C) SRTP
(D) VLAN
Rate this question:
(A) Network-based
(B) Signature-based
(C) Heuristic-based
(D) Anomaly-based
Rate this question:
(A) Wireless access point
(B) Firewall
(C) Layer 2 switch
(D) Bridge
Rate this question:
(A) Support voice and video transmissions
(B) Provide time synchronization
(C) Enable email usage
(D) Encrypt data-in-transit
Rate this question:
(A) SIEM
(B) Network mapper
(C) Network scanner
(D) Nmap
Rate this question:
(A) A syn stealth scan
(B) Vulnerability scan
(C) Ping scan
(D) Penetration test
Rate this question:
(A) NAT
(B) SRTP
(C) SNMPv3
(D) DNSSEC
Rate this question:
(A) Stateless firewall
(B) Stateful firewall
(C) Web application firewall
(D) Host-based firewall
Rate this question:
(A) FTP
(B) SNMPv3
(C) SFTP
(D) SRTP
Rate this question:
(A) Content inspection
(B) Malware inspection
(C) URL filter
(D) DDos mitigator
Rate this question:
(A) Create rules to block all outgoing traffic from a private IP address.
(B) Implement a flood guard on switches.
(C) Add a web application firewall.
(D) Create rules to block all incoming traffic from a private IP address.
Rate this question:
(A) Load balancing
(B) Clustering
(C) RAID
(D) Affinity scheduling
Rate this question:
(A) False negatives
(B) False positives
(C) Signature-based
(D) Behavioral-based IDS
Rate this question:
(A) TLS
(B) SMTP
(C) HTTP
(D) SSH
Rate this question:
(A) Install HIPS on the SCADA systems
(B) Install a firewall on the border of the SCADA network.
(C) Install a NIPS on the border of the SCADA network
(D) Install a honeypot on the SCADA network
Rate this question:
(A) /var/log/btmp
(B) /var/log/fail
(C) var/log/httpd
(D) /var/log/kern
Rate this question:
(A) Active-passive
(B) Round-robin
(C) Affinity
(D) Active-active
Rate this question:
(A) Load balancing
(B) Proxy server
(C) UTM
(D) Content inspection
Rate this question:
(A) arp
(B) ipconfig
(C) netstat
(D) ping
Rate this question:
(A) Banner grabbing
(B) Vulnerability scan
(C) password cracker
(D) Protocol analyzer
Rate this question:
(A) SMTP
(B) TLS
(C) SFTP
(D) SRTP
Rate this question:
(A) Flood guard
(B) SNMPv3
(C) SRTP
(D) RSTP
Rate this question:
(A) NIDS and HIDS
(B) NIPS and HIPS
(C) SIEM and NIPS
(D) SIEM and NIDS
Rate this question:
(A) An out-of-band IPS
(B) An in-band IPS
(C) A passive IDS
(D) An out-of-band IDS
Rate this question:
(A) SIEM
(B) Netcat
(C) Protocol analyzer
(D) Vulnerability scanner
Rate this question:
(A) Identify if a server is running a service using port 80 and is reachable.
(B) Launch an attack on a server sending 80 separate packets in a short period of time.
(C) Use Netcat to remotely administer the server
(D) Use Netcate to start an RDP session on the server.
Rate this question:
(A) Wiredump
(B) Tcpdump
(C) Netcat
(D) Nmap
Rate this question:
(A) Permanent
(B) Health
(C) RADIUS
(D) Dissolvable
Rate this question:
(A) Phishing
(B) Zero-day
(C) Open-source intelligence
(D) Hoax
Rate this question:
(A) VLAN
(B) NAT
(C) UTM
(D) DNSSEC
Rate this question:
(A) Encryption on employee-owned devices
(B) HSM
(C) ISA
(D) Remote wipe
Rate this question:
(A) NAC
(B) VPN
(C) IDS
(D) IPS
Rate this question:
(A) Stateless firewall
(B) Stateful firewall
(C) Network firewall
(D) Application-based firewall
Rate this question:
(A) FTP
(B) SSH
(C) SMTP
(D) HTTP
Rate this question:
(A) Encrypt sensitive data
(B) Storage segmentation
(C) Full device encryption
(D) Rooting
Rate this question:
(A) SIEM
(B) Netcat
(C) Tcpdump
(D) Gray box test
Rate this question:
(A) Geofencing
(B) Geolocation
(C) GPS tagging
(D) Containerization
Rate this question:
(A) Network mapper
(B) Protocol analyzer
(C) Network scanner
(D) SIEM
Rate this question:
(A) Geofence
(B) Containerization
(C) Tethering
(D) Context-aware authentication
Rate this question:
(A) Disable unused ports.
(B) Implement an implicit deny rule.
(C) Disable STP.
(D) Enable SSH.
Rate this question:
(A) VLAN
(B) NAT
(C) UTM
(D) DNSSEC
Rate this question:
(A) SCADA access
(B) Storage segmentation
(C) Database security
(D) Embedded RTOS
Rate this question:
(A) TLS
(B) SMTP
(C) HTTP
(D) SSH
Rate this question:
(A) SMTP
(B) TLS
(C) SFTP
(D) SRTP
Rate this question:
(A) The new service
(B) An ACL
(C) ServerA
(D) The VLAN
Rate this question:
(A) Reverse proxy
(B) Media gateway
(C) Web application firewall
(D) Mail gateway
Rate this question:
(A) NIDS and HIDS
(B) NIPS and HIPS
SIEM and NIPS
SIEM and NIDS
Rate this question:
(A) NAC
(B) VPN
(C) IDS
(D) IPS
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.