Dive into the 'Network Security Trivia Quiz' to explore key concepts such as nonrepudiation, internal threats, and packet filtering. This quiz assesses your understanding of network security mechanisms and threats, enhancing your skills in protecting networks against various types of cyber attacks.
Industrial espionage
Revenge
Financial gain
All of the above
Rate this question:
Plausible deniability
Integrity
Nonrepudiation
Undeniability
Rate this question:
Their own subnet
A DMZ
An internal LAN
A network perimeter
Rate this question:
Port number
Open ports
Time of access attempts
IP address
Rate this question:
Cracker
Hacker
Industrial spy
Cyberterrorist
Rate this question:
Network address
Socket
Script
Port ID
Rate this question:
Routing table
Rule base
Access control list
Packet filter
Rate this question:
Virtual
Auditing
Physical
Password
Rate this question:
Shut down Internet DNS servers
Disrupt computer-controlled industrial operations
Steal financial information
Be used by script kiddies
Rate this question:
True
False
Rate this question:
Worm
Virus
Trojan horse
SYN flood
Rate this question:
Allow all traffic
Block all traffic except specified types
Allow all traffic except specified types
Block all traffic
Rate this question:
Signatures
Signals
True positives
Alerts
Rate this question:
IPv6 uses DHCP for its configuration settings
IPv6 uses a 128-bit address space
IPv4 cannot support IPsec
IPv6 incorporates IPsec
Rate this question:
172, 191
191, 224
192, 239
192, 223
Rate this question:
Network Address Translation (NAT)
Configuring the computer to insert a fake source IP address into outgoing messages
Proxy servers
Setting up software firewalls on all internal hosts
Rate this question:
Broadcasting to all hosts on a subnet
Testing the local TCP/IP software implementation
Experimentation
Testing the local NIC
Rate this question:
The header does not contain a checksum
The data is transmitted in clear text
It is connectionless
Routers typically drop a large number of UDP packets
Rate this question:
191.9.205.22/19
191.9.205.22/18
191.9.205.22/17
191.9.205.22/16
Rate this question:
Routers drop packets that are too large.
Routers bounce packets back to the sender to be resized.
Routers adjust their MTUs to accommodate the oversized packet.
Routers break packets into smaller pieces called fragments.
Rate this question:
Multicast Listening Detection
IGMPv6
Multicast Listener Discovery
Neighbor Discovery
Rate this question:
Encrypted IP addresses, clear text
IP addresses, MAC addresses
FQDNs, IP addresses
Static addresses, DHCP
Rate this question:
Fragments numbered 0 contain port information
Fragments numbered 1 or higher are passed through filters
Fragmented packets cannot be assembled
Fragmentation is frequently used
Rate this question:
Multicast
Unicast
Anycast
Netcast
Rate this question:
Sequence number
Sliding window size
Transmission rate
Port number in use for the session
Rate this question:
SYN
ACK
RST
FIN
Rate this question:
60
54
58
22
Rate this question:
1080::8:8:::2::C:417A
1080::8:800:200C:417A
1080::8:8::::20:C:417A
:1080::8:800:200C:417A
Protocols
TCP/IP Headers
Attack signatures
Port numbers
Rate this question:
Attack signatures can be compared to lists of known attack signatures on the CVE Web site.
Attack signatures can be compared to current network topology.
Installing application patches can thwart a reported attack.
Current network vulnerabilites can be used to generate application patches.
Rate this question:
Logon attempts
Message digest
TCP options
Ethernet interface number
Rate this question:
Check string
One-way hash
Hexadecimal code
Checksum
Rate this question:
Fragments are crafted to be too large or too small
The initial packet is missing
The fragments arrive too slowly
The final fragment sent is less than 400 bytes long.
Rate this question:
One with the SYN/ACK flags set
One with the ACK flag set
One with the SYN flag set
One with the ACK/PSH flags set
Rate this question:
A source IP address
A destination IP address
An ICMP echo request
An established connection
Rate this question:
A fragment
An ICMP flood
A false Internet time stamp
A packet with SYN/FIN/ACK flags set
Rate this question:
It acknowledges receipt of the previous packet in the sequence.
It acknowledges that a connection has been made.
It verifies that the source and destination IP addresses are correct.
It acknowledges the ID number the packet is using.
Rate this question:
SYN, ACK, FIN, RST
SYN, PSH, ACK, RST
SYN, SYN/ACK, ACK
SYN, PSH, ACK, FIN
Rate this question:
TCP/IP
FTP
HTTP
ICMP
Rate this question:
Trojan program
Ping sweep
Denial of service
Ping of Death
Rate this question:
Network Information System
Network File System
Network File Sharing
Portmapper
Rate this question:
Watch your log files closely
Install additional IDPS sensors
Keep your anti-adware software updated
Keep your IDPS signature files updated.
Rate this question:
IPv6 fragmentation occurs on IPv6-compliant routers
IPv4 is unfragmentable
IPv6 fragmentation occurs only at the source node
IPv6 maximum fragment size is larger than its IPv6 counterpart
Rate this question:
Pseudorandom number generators
Hashing functions
Feistel networks
Side channels
Rate this question:
128 or 256 bits
128, 192, or 256 bits
Variable
128 bits
Rate this question:
Certificate publisher
Certification authority
Certificate revocation list
Certificate store
Rate this question:
Certificate revocation list
Certification authority
Certificate publisher
Registration authority
Rate this question:
Quiz Review Timeline (Updated): Jul 29, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.