This will assist you in port identification, IDS systems, Disaster Recovery, Encryption methods and much more. Good Luck!
True
False
Rate this question:
Educate all users
Fire an employee responsible for the breach
Install an IDS
Update and post new security bulletins
Disable FTP externally
Rate this question:
IMAP
PTPP
SNMP
L2TP
Rate this question:
Proxy
Stateful-inspection
Packet-Filtering
None of the above
Rate this question:
162
1701
1512
443
389
Rate this question:
Brute force attack
Bogus Emails
Port Scan
Phone calls reporting need for password reset
Rate this question:
1
128 bit stream
64 bit block
2
Rate this question:
Proxy
User
Router
Computer
None of the above
Rate this question:
53
23
49
25
Rate this question:
110
23
20
162
Rate this question:
PGP
ECC
RC5
Blowfish
S/MIME
Rate this question:
Hashing
RC5
Blowfish
ECC
Rate this question:
80
25
22
88
8080
Rate this question:
ACL
User Database
Routing Table
ARP
Rate this question:
88
5190
161
67
Rate this question:
True
False
Rate this question:
143
119
53
67
Rate this question:
Trojan Horse
Boot-sector virus
EXE type virus
Worm
Rate this question:
1812
1512
443
88
Rate this question:
1.2 TB
200 GB
400 GB
100 GB
Rate this question:
5010
2025
5050
1843
161
Rate this question:
ECC
Host-Based
Network-Based
Firewall-Based
Rate this question:
2
6
1
4
Rate this question:
One-way
Two-way
Three-way
Five-way
Rate this question:
Hash of your password
Hash of your user name
Hash of your pass phrase
Hash of the public key
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.