This Sec+ study guide quiz assesses knowledge in network security, focusing on confidentiality protocols, steganography, TCP\/IP hijacking, backup integrity, network topology, and penetration testing. It is essential for learners preparing for the CompTIA Security+ certification.
Logic bomb
Spam
Rootkit
Privilege escalation
Rate this question:
ARP poisoning
Phishing
Shoulder surfing
Man-in-the-middle
Rate this question:
Removal
Containment
Recovery
Monitor
Rate this question:
Antivirus
Content filter
Firewall
Proxy server
Rate this question:
Phishing
Adware
Botnet
Trojan
Rate this question:
Mandatory Access Control (MAC)
Rule-Based Access control (RBAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Rate this question:
Job rotation
Mandatory vacations
Least privilege
Separation of duties
Rate this question:
Two-factor authentication
Single sign-on
Smart card
Biometrics
Rate this question:
Privilege escalation
Botnet
Adware
Spyware
Rate this question:
Attacker privilege escalation
Installation of a back door
Denial of Service (DoS)
Use of default passwords
Rate this question:
Certificate revocation list
Certificate suspension
Recovery agent
Certificate authority
Rate this question:
Availability
Integrity
Non-repudiation
Confidentiality
Rate this question:
Replay attacks
Phishing
Man-in-the-middle attacks
Shoulder surfing
Rate this question:
Verify system access
Facilitate penetration testing
Gain system access
Sniff network passwords
Rate this question:
By conducting another backup
By using software to recover deleted files
By restoring part of the backup
By reviewing the written procedures
Rate this question:
ACL
Account expiration
Time of day restrictions
Logical tokens
Rate this question:
Rootkit
Adware
Spyware
Spam
Rate this question:
Worm
Rootkit
Trojan
Virus
Rate this question:
Most privilege
Least privilege
Rule based
Role based
Rate this question:
Vulnerability scanner
NIPS
Protocol analyzer
Networkmapper
Rate this question:
Rogue access points
War driving
Weak encryption
Session hijacking
Rate this question:
Message digest
Encrypt information
Hide information
Data integrity
Rate this question:
One
Two
Five
Seven
Rate this question:
DDoS
Privilege escalation
Disclosure of PII
Single point of failure
Rate this question:
Network intrusion detection
Patch management
Firewall configuration
Antivirus selection
Rate this question:
Reformatting
Destruction
Sanitization
Deleting
Rate this question:
User access and rights
Data storage and retention policies
Users group policy
Acceptable usage policy
Rate this question:
RAS and username/password
RADIUS and L2TP
LDAP and WPA
Iris scan and proximity card
Rate this question:
DLL injection
DDoS attack
DNS poisoning
ARP poisoning
Rate this question:
VLANs
NAT
Access lists
Intranet
Rate this question:
Logic bomb
Worm
Trojan
Rootkit
Rate this question:
Honeynet
DMZ
Honeypot
VLAN
Rate this question:
DMZ
VLAN
NIDS
NAT
Rate this question:
Patch
Hotfix
Security roll-up
Service pack
Rate this question:
Rogue access points
80211 mode.
Weak encryption.
SSID broadcasts
Rate this question:
Internet content filter
Proxy
Protocol analyzer
NIDS
Rate this question:
HIDS log
Security log
Firewall log
System log
Rate this question:
Recovery agent
Certificate revocation list
Key escrow
Public key recovery
Rate this question:
A security patch
A securityhotfix
An OS service pack
A security template
Rate this question:
RADIUS
Password cracker
Port scanner
Man-in-the-middle attack
Rate this question:
S/MIME
SMTP
L2TP
VPN
Rate this question:
Steganography
Worm
Trojan horse
Virus
Rate this question:
Change management
Secure disposal
Password complexity
Chain of custody
Rate this question:
Install a word processor.
Run the latest spyware.
Apply the baseline configuration
Run OS updates.
Rate this question:
The key owner has exclusive access to the private key.
Everyone has access to the private key on the CA.
Only the CA has access to the private key.
The key owner and a recipient of an encrypted email have exclusive access to the private key.
Rate this question:
IP spoofing
MAC filtering
SSID spoofing
Closed network
Rate this question:
Spanning port
Subnetting
VLAN
NAT
Rate this question:
Teardrop
TCP/IP hijacking
Phishing
Replay
Rate this question:
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Computer Networks And Security Exams Prep Test
This Computer Networks and Security Exams Prep Test assesses knowledge on network protocols, wireless standards, and security measures. It evaluates understanding of Frame Relay,...
Questions:
100 |
Attempts:
320 |
Last updated:
Mar 21, 2023
|
BCA 6th Sem Internal Exam Network Security
This BCA 6th Sem internal exam on Network Security assesses knowledge on SSLv3 protocol specifics, including padding, PRF inputs, and alert codes. It also tests understanding of...
Questions:
15 |
Attempts:
465 |
Last updated:
Mar 12, 2024
|
Network Technologies And Tools Quiz!
The 'Network Technologies and Tools Quiz!' assesses knowledge on securing network communication and managing network devices. It covers encryption of PII, secure network protocols...
Questions:
14 |
Attempts:
758 |
Last updated:
Mar 21, 2023
|
Network Security Exam MCQ Quiz!
Dive into the intricacies of network security with our Network Security Exam MCQ Quiz! Test your knowledge on SSL protocols, session state parameters, and encryption processes....
Questions:
13 |
Attempts:
393 |
Last updated:
Mar 19, 2023
|
The Ultimate Fundamentals Of Networking Test!
The Ultimate Fundamentals of Networking Test assesses essential security concepts within network environments. It covers DMZ purposes, intrusion detection, password salting,...
Questions:
102 |
Attempts:
715 |
Last updated:
Mar 22, 2023
|
Important Trivia Questions On Network Security!
Do you wish to learn more about Network security? Below are Important Trivia Questions on Network Security that every network operator should be able to answer with ease. Network...
Questions:
10 |
Attempts:
17952 |
Last updated:
Aug 24, 2023
|