Cyber security is an essential aspect of modern technology. Take this informative quiz to see how well aware you are on the fundamental of cyber security. With our super interesting quiz, get ready to learn new exciting things! We are sure that you'll do wonderfully on our quiz, so let's get started! All the questions are compulsory. Please make sure See moreto read all the questions carefully before answering. We sincerely wish you good luck with this fun quiz! Keep learning!
Something a User Did
Something a User has
Something a User is
None of the above
Rate this question:
MD5
PEAP=TLS
FTPS Implicit
None of the above
Rate this question:
Change the server's SSL key and add the previous key to the CRL.
Install a host-based firewall.
Add input validation to forms.
None of the above
Rate this question:
CRL
Key Escrow
CA
None of the above
Rate this question:
Trojan
Pharming
Virus
Logic Bomb
Rate this question:
Whaling
Dumpster Diving
Shoulder Surfing
Tailgating
Rate this question:
LANMAN
MD5
WEP
None of the above
Rate this question:
Host intrusion detection
Network firewall
Host based firewall
None of the above
Rate this question:
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network.
Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network.
None of the above
Rate this question:
Job rotation
Separation of duties
Mandatory vacation
None of the above
Rate this question:
Document scan results for the change control board.
Organize data based on severity and asset value.
Examine the vulnerability data using a network analyzer.
None of the above
Rate this question:
Submit the public key to the CRL.
Use the recovery agent to revoke the key.
Submit the private key to the CRL.
None of the above
Rate this question:
Password complexity
Phishing Techniques
Handling PII
None of the above
Rate this question:
Virtualization
Network Access Control
VPN
None of the above
Rate this question:
Protocol Analyzer
Port Scanner
Honeypot
None of the above
Rate this question:
FTP
TFTP
SFTP
None of the above
Rate this question:
RTP
SNMP
IPSec
None of the above
Rate this question:
Platform as a service
Software as a service
Infrastructure as a service
None of the above
Rate this question:
Buffer overflow
XML injection
SML injection
None of the above
Rate this question:
Availability
Integrity
Confidentiality
None of the above
Rate this question:
3DES
LANMAN
PGP
None of the above
Rate this question:
Antivirus Software
ACLs
NIDS
None of the above
Rate this question:
SSID
DHCP
Mac filtering
None of the above
Rate this question:
IP allow any
Implicit deny
Separation on Duties
None of the above
Rate this question:
Full disc encryption
TPM
HSM
None of the above
Rate this question:
ARP poisoning
MAC spoofing
DNS poisoning
None of the above
Rate this question:
Quiz Review Timeline (Updated): Sep 3, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.