A majority of people spends most of their time on the internet either doing research or just checking on their online presence. If you are a Sec+ student take this quiz to find how much you know about the subject and more.
Back door
Worm
Zombie
Trojan
Rate this question:
Automatic callback
Monitoring outbound calls
Awareness training
Use of VoIP
Rate this question:
Logic Bomb
DoS
Worm
Rootkit
Rate this question:
Immediately following lessons learned sessions
Once a month, during peak business hours
After the network is stable and online
In accordance with the disaster recovery plan
Rate this question:
Update antivirus definitions
Disconnect the entire network from the Internet.
Apply proper forensic techniques.
Restore missing files on the affected system
Rate this question:
Security log
Networkmapper
Port scanner
Protocol analyzer
Rate this question:
Logic bomb
Trojan horse
Worm
Rootkit
Rate this question:
NIDS
DMZ
NAT
VLAN
Rate this question:
Due process
Due diligence
Scope of work
Service level agreement
Rate this question:
Unshielded twisted pair cable
Fiber optic cable
Ethernet CAT5 cable
Coaxial cable
Rate this question:
To evaluate the scene and repair the problem
To secure the scene and preserve evidence
To evaluate the scene and determine the cause
To gather evidence and write reports
Rate this question:
Elevate system privileges.
Monitor networktraffiC.
Capture private keys.
Begin key recovery
Rate this question:
Static electricity
Power surge
Electromagnetic interference
Brown out
Rate this question:
DoS
Man-in-the-middle
DDoS
TCP/IP hijacking
Rate this question:
VPN
NAT
VLAN
DMZ
Rate this question:
Fiber
UTP
STP
Coaxial
Rate this question:
Antivirus
User training
NIDS
HIDS
Rate this question:
Pop-up blocker
Anti-spam
Antivirus
Personal software firewall
Rate this question:
Booking slip
Affidavit
Chain of custody
Evidence log
Rate this question:
Implicit deny
Separation of duties
Least privilege
Job rotation
Rate this question:
Defense-in-depth
Logical token
ACL
Mantrap
Rate this question:
Mirrored site
Cold site
Warm site
Hot site
Rate this question:
Mobile device
Transaction
Firewall
Performance
Rate this question:
Implicit deny
Least privilege
Job rotation
Separation of duties
Rate this question:
Compressed air
Tape recorder
Fingerprint cards
Digital camera
Rate this question:
Security log
Performance baseline
Application log
Application log
Rate this question:
The firewall
The information security officer
The certificate authority
The key escrow agent
Rate this question:
When providing a proof of concept demonstration for a vulnerability
While in the reconnaissance phase
When performing network mapping
When conducting performance monitoring
Rate this question:
Firewall
DMZ
VLAN
Proxy
Rate this question:
Man-in-the-middle attack
Protocol analysis
Privilege escalation
Cross-site scripting
Rate this question:
Port scanner
Performance monitor
Ipconfig /all
TFTP
Rate this question:
CHAP
PKI
PGP
Kerberos
Rate this question:
NAT
DMZ
NAC
Subnetting
Rate this question:
PKI
CRL
Escrow
CA
Rate this question:
Registration
Recovery agent
Key escrow
Asymmetric
Rate this question:
NTLMv2
NTLM
VLAN
LANMAN
Rate this question:
Content filter
Protocol analyzer
Honeypot
HIDS
Rate this question:
Hotfix
Remote desktop
Patch management
Service packs
Rate this question:
War driving
War chalking
Blue jacking
Bluesnarfing
Rate this question:
Sorting through the garbage of an organization to obtain information used for configuration management.
Sorting through the garbage of an organization to obtain information used for a subsequent attack.
Sorting through the trash of an organization to obtain information found on their intranet.
Sorting through the trash of an organization to recover an old user ID badge previously used for an attack
Rate this question:
Registration
CA
CRL
Key escrow
Rate this question:
HTTPS
Telnet
SFTP
SHTTP
Rate this question:
Antivirus log
RADIUS log
Performance log
Host firewall log
Rate this question:
Rogue access points being installed
Copying sensitive information with cellular phones
Removing mass storagei SCSI drives
Removing network attached storage
Rate this question:
Acceptable use policy
Data retention and disclosure policy
Service level agreement
Written permission
Rate this question:
Botnets
Adware
Spyware
Trojans
Rate this question:
Registration
Certificate authority
Recovery agent
Key escrow
Rate this question:
ActiveX component
SQL injection
Cross-site scripting
XML
Rate this question:
Quiz Review Timeline (Updated): Apr 24, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.