Quiz : How Well Aware Are You On Fundamentals Of Cyber Security?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lunababy213
L
Lunababy213
Community Contributor
Quizzes Created: 1 | Total Attempts: 661
Questions: 27 | Attempts: 661

SettingsSettingsSettings
Quiz : How Well Aware Are You On Fundamentals Of Cyber Security? - Quiz

Cyber security is an essential aspect of modern technology. Take this informative quiz to see how well aware you are on the fundamental of cyber security. With our super interesting quiz, get ready to learn new exciting things! We are sure that you'll do wonderfully on our quiz, so let's get started! All the questions are compulsory. Please make sure to read all the questions carefully before answering. We sincerely wish you good luck with this fun quiz! Keep learning!


Questions and Answers
  • 1. 

    Which of the following security threats does shredding mitigate?       

    • A.

      Dumpster Diving

    • B.

      Shoulder Surfing

    • C.

      Tailgating

    • D.

      None of the above

    Correct Answer
    A. Dumpster Diving
    Explanation
    Shredding mitigates the security threat of dumpster diving. Dumpster diving is a technique used by attackers to retrieve sensitive information by rummaging through trash or discarded documents. Shredding documents makes it difficult for attackers to piece together the information and reduces the risk of unauthorized access to sensitive data.

    Rate this question:

  • 2. 

    A thumbprint scanner is used to test which of the following aspects of human authentication?       

    • A.

      Something a User Did

    • B.

      Something a User has

    • C.

      Something a User is

    • D.

      None of the above

    Correct Answer
    C. Something a User is
    Explanation
    A thumbprint scanner is used to test "Something a User is" aspect of human authentication. This means that it verifies the unique physical characteristic of an individual, in this case, the thumbprint, to authenticate their identity.

    Rate this question:

  • 3. 

    Which of the following protocols requires the use of a CA based authentication process?       

    • A.

      MD5

    • B.

      PEAP=TLS

    • C.

      FTPS Implicit

    • D.

      None of the above

    Correct Answer
    B. PEAP=TLS
    Explanation
    PEAP-TLS (Protected Extensible Authentication Protocol with Transport Layer Security) requires the use of a CA (Certificate Authority) based authentication process. This protocol uses digital certificates issued by a trusted CA to verify the identity of the server and client during the authentication process. The CA ensures the authenticity and integrity of the certificates, providing a secure and trusted method of authentication.

    Rate this question:

  • 4. 

    A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?       

    • A.

      Change the server's SSL key and add the previous key to the CRL.

    • B.

      Install a host-based firewall.

    • C.

      Add input validation to forms.

    • D.

      None of the above

    Correct Answer
    C. Add input validation to forms.
    Explanation
    The best remediation action for a web application vulnerable to a SQL injection attack is to add input validation to forms. Input validation helps to ensure that any user input is properly validated and sanitized before it is used in SQL queries, preventing malicious SQL code from being injected. Changing the server's SSL key and adding it to the Certificate Revocation List (CRL) or installing a host-based firewall may be important security measures, but they do not directly address the specific vulnerability of SQL injection.

    Rate this question:

  • 5. 

    Which of the following PKI implementation element is responsible for verifying the authenticity of certificate contents?       

    • A.

      CRL

    • B.

      Key Escrow

    • C.

      CA

    • D.

      None of the above

    Correct Answer
    C. CA
    Explanation
    The correct answer is CA. A Certificate Authority (CA) is responsible for verifying the authenticity of certificate contents in a PKI (Public Key Infrastructure) implementation. The CA is a trusted third party that issues and signs digital certificates, ensuring that the certificate contains accurate and valid information about the identity of the certificate holder. The CA uses various methods to verify the identity of the certificate requester before issuing the certificate, such as verifying legal documents or conducting background checks.

    Rate this question:

  • 6. 

    TWhich of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO).        

    • A.

      Trojan

    • B.

      Pharming

    • C.

      Virus

    • D.

      Logic Bomb

    Correct Answer(s)
    B. pHarming
    D. Logic Bomb
    Explanation
    An antivirus scanner is unlikely to discover a Pharming malware because it does not rely on traditional malicious code or files. Pharming involves manipulating DNS settings to redirect users to fake websites, making it difficult for an antivirus scanner to detect. Similarly, a Logic Bomb is a type of malware that is triggered by a specific event or condition, making it harder to detect by an antivirus scanner that primarily looks for known patterns or signatures of malicious code.

    Rate this question:

  • 7. 

    The security administrator implemented privacy screens, password protected screen savers, and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate? (Select TWO).        

    • A.

      Whaling

    • B.

      Dumpster Diving

    • C.

      Shoulder Surfing

    • D.

      Tailgating

    Correct Answer(s)
    B. Dumpster Diving
    C. Shoulder Surfing
    Explanation
    The security administrator is implementing privacy screens, password protected screen savers, and a secure shredding and disposal service to mitigate the attacks of dumpster diving and shoulder surfing. Dumpster diving refers to the act of searching through trash or recycling bins to obtain sensitive information. By securely shredding and disposing of documents, the administrator is preventing attackers from gaining access to confidential information. Shoulder surfing, on the other hand, involves an attacker observing someone's screen or keyboard to obtain sensitive information. The privacy screens and password protected screen savers help to prevent unauthorized individuals from viewing or accessing sensitive information.

    Rate this question:

  • 8. 

    A security administrator has discovered through a password auditing software that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?       

    • A.

      LANMAN

    • B.

      MD5

    • C.

      WEP

    • D.

      None of the above

    Correct Answer
    A. LANMAN
    Explanation
    The correct answer is LANMAN. LANMAN is a password hashing algorithm that splits the password into two 7-character halves and hashes them separately. This makes it vulnerable to attacks where the first half is cracked, and then the second half is cracked separately. This is why the security administrator discovered that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password.

    Rate this question:

  • 9. 

    Which of the following devices would be installed on a single computer to prevent intrusion?       

    • A.

      Host intrusion detection

    • B.

      Network firewall

    • C.

      Host based firewall

    • D.

      None of the above

    Correct Answer
    C. Host based firewall
    Explanation
    A host-based firewall would be installed on a single computer to prevent intrusion. This type of firewall monitors and controls incoming and outgoing network traffic on that specific computer, protecting it from unauthorized access and potential threats. It acts as a barrier between the computer and the external network, allowing only authorized connections and blocking any suspicious or malicious activity. This helps to enhance the security of the individual computer and prevent unauthorized access or intrusion attempts.

    Rate this question:

  • 10. 

    Which of the following BEST describes the proper method and reason to implement port security?       

    • A.

      Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.

    • B.

      Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network.

    • C.

      Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network.

    • D.

      None of the above

    Correct Answer
    A. Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
    Explanation
    The proper method to implement port security is to apply a security control that restricts access to specific ports based on the MAC addresses of the end devices. This prevents unauthorized devices from connecting to the network, ensuring only approved devices can access the network through those specific ports.

    Rate this question:

  • 11. 

    A security administrator with full administrative rights on the network is forced to change roles on a quarterly basis with another security administrator. Which of the following describes this form of access control?       

    • A.

      Job rotation

    • B.

      Separation of duties

    • C.

      Mandatory vacation

    • D.

      None of the above

    Correct Answer
    A. Job rotation
    Explanation
    Job rotation is a form of access control where a security administrator with full administrative rights on the network is required to change roles with another security administrator on a quarterly basis. This practice helps to minimize the risk of unauthorized access or misuse of privileges by ensuring that no single individual has continuous access and control over the network. By regularly rotating job roles, it becomes more difficult for any one person to exploit their privileges for malicious purposes.

    Rate this question:

  • 12. 

    Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?       

    • A.

      Document scan results for the change control board.

    • B.

      Organize data based on severity and asset value.

    • C.

      Examine the vulnerability data using a network analyzer.

    • D.

      None of the above

    Correct Answer
    B. Organize data based on severity and asset value.
    Explanation
    When conducting a corporate vulnerability assessment, the best action to perform would be to organize the data based on severity and asset value. This approach allows for prioritization of vulnerabilities, focusing on those that pose the highest risk to the organization's assets. By organizing the data in this manner, the assessment team can effectively allocate resources and address the most critical vulnerabilities first, ensuring that the organization's most valuable assets are protected.

    Rate this question:

  • 13. 

    Which of the following must a security administrator do when the private key of a web server has been compromised by an intruder?       

    • A.

      Submit the public key to the CRL.

    • B.

      Use the recovery agent to revoke the key.

    • C.

      Submit the private key to the CRL.

    • D.

      None of the above

    Correct Answer
    A. Submit the public key to the CRL.
    Explanation
    When the private key of a web server has been compromised by an intruder, the security administrator must submit the public key to the Certificate Revocation List (CRL). This is because the CRL is a list of revoked certificates, and by submitting the public key, it informs other entities that the private key associated with it is no longer trusted. This helps prevent any further use of the compromised private key for malicious purposes.

    Rate this question:

  • 14. 

    Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?       

    • A.

      Password complexity

    • B.

      Phishing Techniques

    • C.

      Handling PII

    • D.

      None of the above

    Correct Answer
    B. pHishing Techniques
    Explanation
    Phishing techniques involve deceptive methods used by attackers to trick individuals into revealing sensitive information, such as bank account details. By educating employees about these techniques, they can become aware of the signs of a phishing attempt and learn how to protect themselves and their bank account information. This knowledge will help them to recognize and avoid falling victim to phishing attacks, ultimately enhancing the security of the organization's sensitive data.

    Rate this question:

  • 15. 

    MAC filtering is a form of which of the following?       

    • A.

      Virtualization

    • B.

      Network Access Control

    • C.

      VPN

    • D.

      None of the above

    Correct Answer
    B. Network Access Control
    Explanation
    MAC filtering is a form of Network Access Control. MAC filtering is a security feature that allows or denies network access based on the Media Access Control (MAC) address of a device. By implementing MAC filtering, network administrators can restrict access to the network only to devices with specific MAC addresses, enhancing network security and preventing unauthorized access. This form of access control is commonly used in wireless networks and can be an effective measure to protect against unauthorized devices connecting to the network.

    Rate this question:

  • 16. 

    Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?      

    • A.

      Protocol Analyzer

    • B.

      Port Scanner

    • C.

      Honeypot

    • D.

      None of the above

    Correct Answer
    A. Protocol Analyzer
    Explanation
    A protocol analyzer is a tool that captures and analyzes network traffic. It can intercept and examine data packets being transmitted over a network. By using a protocol analyzer, one can inspect the contents of the packets, including any passwords or sensitive information being transmitted. Therefore, a protocol analyzer can be used to determine if an application is transmitting a password in clear-text.

    Rate this question:

  • 17. 

    Which of the following file transfer protocols is an extension of SSH 

    • A.

      FTP

    • B.

      TFTP

    • C.

      SFTP

    • D.

      None of the above

    Correct Answer
    C. SFTP
    Explanation
    SFTP stands for Secure File Transfer Protocol and is an extension of SSH (Secure Shell). It provides a secure way to transfer files over a network, encrypting the data during transfer. Unlike FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol), which do not provide encryption, SFTP ensures the confidentiality and integrity of the transferred files. Therefore, SFTP is the correct answer as it is the file transfer protocol that is an extension of SSH.

    Rate this question:

  • 18. 

    A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?       

    • A.

      RTP

    • B.

      SNMP

    • C.

      IPSec

    • D.

      None of the above

    Correct Answer
    C. IPSec
    Explanation
    IPSec should be used for the site-to-site VPN tunnel because it provides secure communication over the internet by encrypting the data packets. It ensures confidentiality, integrity, and authentication of the data transmitted between the main office and the remote branch. RTP is used for real-time audio and video communication, SNMP is used for network management, and "None of the above" is not a suitable option as IPSec is the standard protocol for VPN tunnels.

    Rate this question:

  • 19. 

    Which of the following cloud computing concepts is BEST described as providing an easy-to-configure OS and on-demand computing for customers?      

    • A.

      Platform as a service

    • B.

      Software as a service

    • C.

      Infrastructure as a service

    • D.

      None of the above

    Correct Answer
    A. Platform as a service
    Explanation
    Platform as a service (PaaS) is the best description for providing an easy-to-configure OS and on-demand computing for customers. PaaS allows users to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an application. It provides a platform that includes an operating system, programming language execution environment, database, and web server, allowing customers to focus on application development rather than infrastructure management.

    Rate this question:

  • 20. 

    During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?       

    • A.

      Buffer overflow

    • B.

      XML injection

    • C.

      SML injection

    • D.

      None of the above

    Correct Answer
    B. XML injection
    Explanation
    The correct answer is XML injection. XML injection is a type of attack where an attacker injects malicious code into an XML input, causing the application to behave unexpectedly. In this scenario, the security analyst discovers JavaScript being used to send random data to another service on the same system, which suggests that the JavaScript is being injected into an XML input to manipulate the data being sent. This is a clear indication of XML injection.

    Rate this question:

  • 21. 

    Which of the following concepts ensures that the data is only viewable to authorized users?       

    • A.

      Availability

    • B.

      Integrity

    • C.

      Confidentiality

    • D.

      None of the above

    Correct Answer
    C. Confidentiality
    Explanation
    Confidentiality ensures that the data is only viewable to authorized users. This concept protects sensitive information from being accessed or disclosed to unauthorized individuals. It involves implementing measures such as access controls, encryption, and secure communication channels to prevent unauthorized access or disclosure of data. By maintaining confidentiality, organizations can protect sensitive information from being compromised and maintain the privacy and trust of their users.

    Rate this question:

  • 22. 

    NTLM is an improved and substantially backwards compatible replacement for which of the following?    

    • A.

      3DES

    • B.

      LANMAN

    • C.

      PGP

    • D.

      None of the above

    Correct Answer
    B. LANMAN
    Explanation
    NTLM is an improved and substantially backwards compatible replacement for LANMAN. LANMAN (LAN Manager) is an outdated and insecure authentication protocol used in early versions of Windows. NTLM (NT LAN Manager) was introduced as a more secure alternative to LANMAN, providing better encryption and authentication mechanisms. Therefore, NTLM replaced LANMAN to enhance the security of Windows authentication.

    Rate this question:

  • 23. 

    A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?       

    • A.

      Antivirus Software

    • B.

      ACLs

    • C.

      NIDS

    • D.

      None of the above

    Correct Answer
    B. ACLs
    Explanation
    The security administrator should check the ACLs (Access Control Lists). ACLs are used to control network traffic and can be configured to allow or deny certain types of connections. If the user is no longer able to transfer files to the FTP server, it is possible that the ACLs have been configured to block FTP traffic. By checking the ACLs, the security administrator can determine if this is the cause of the issue and make any necessary adjustments to allow FTP traffic.

    Rate this question:

  • 24. 

    Which of the following should be enabled to ensure only certain wireless clients can access the network?       

    • A.

      SSID

    • B.

      DHCP

    • C.

      Mac filtering

    • D.

      None of the above

    Correct Answer
    C. Mac filtering
    Explanation
    Mac filtering should be enabled to ensure only certain wireless clients can access the network. Mac filtering is a security feature that allows the network administrator to specify which devices are allowed to connect to the network based on their MAC addresses. By enabling Mac filtering, only devices with approved MAC addresses will be able to access the network, providing an additional layer of security.

    Rate this question:

  • 25. 

    Which of the following is MOST likely to be the last rule contained on any firewall?       

    • A.

      IP allow any

    • B.

      Implicit deny

    • C.

      Separation on Duties

    • D.

      None of the above

    Correct Answer
    B. Implicit deny
    Explanation
    The last rule on any firewall is most likely to be "Implicit deny." This rule is commonly used as a default rule that denies all traffic that does not match any of the preceding rules. It acts as a safety net to ensure that any traffic that is not explicitly allowed is denied by default. This helps to enhance the security of the network by blocking any unauthorized access attempts.

    Rate this question:

  • 26. 

    A security administrator is implementing a solution that can integrate with an existing server and provide encryption capabilities. Which of the following would meet this requirement?       

    • A.

      Full disc encryption

    • B.

      TPM

    • C.

      HSM

    • D.

      None of the above

    Correct Answer
    C. HSM
    Explanation
    An HSM (Hardware Security Module) is a device that provides secure storage and cryptographic operations. It can integrate with an existing server and provide encryption capabilities. HSMs are often used in enterprise environments to protect sensitive data and ensure the security of cryptographic operations. They offer a high level of security and can be used for tasks such as key management, encryption, and digital signing. Therefore, an HSM would meet the requirement of integrating with an existing server and providing encryption capabilities.

    Rate this question:

  • 27. 

    Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?       

    • A.

      ARP poisoning

    • B.

      MAC spoofing

    • C.

      DNS poisoning

    • D.

      None of the above

    Correct Answer
    A. ARP poisoning
    Explanation
    ARP poisoning is a technique where an attacker sends false Address Resolution Protocol (ARP) messages to a switch, causing it to associate the attacker's MAC address with the IP address of another machine on the network. This allows the attacker to intercept and redirect network traffic to their malicious machine, enabling them to eavesdrop on or modify the traffic. MAC spoofing, on the other hand, involves changing the MAC address of a network interface to impersonate another device. DNS poisoning involves corrupting the DNS cache to redirect users to malicious websites. Therefore, the correct answer is ARP poisoning.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 03, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 30, 2011
    Quiz Created by
    Lunababy213
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.