Security + Systems Security

42 Questions | Total Attempts: 290

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Never take security for granted – the right software, hardware or physical protection can be pivotal in keeping you, your personal information and your belongings from the wrong hands. What do you know about the topic of security?


Questions and Answers
  • 1. 
    Which of the following is not one of the main components of the security triad?
    • A. 

      Distributed

    • B. 

      Physical

    • C. 

      Operational

    • D. 

      Management

  • 2. 
    Which of the following goals of information security refers to preventing computer or information violations from occurring?
    • A. 

      Detection

    • B. 

      Prevention

    • C. 

      Recursion

    • D. 

      Response

  • 3. 
    During which general type of attack does someone who should not be able to get access attempt to get to your resources?
    • A. 

      Access

    • B. 

      Modification and repudiation

    • C. 

      Denial-of-service

    • D. 

      Interception

  • 4. 
    Which of the following are the most popular spoofing attacks? (Choose two.)
    • A. 

      TCP spoofing

    • B. 

      DHCP spoofing

    • C. 

      IP spoofing

    • D. 

      DNS spoofing

  • 5. 
    Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?
    • A. 

      Brute force

    • B. 

      Dictionary

    • C. 

      Man-in-the-middle

    • D. 

      NetBus

  • 6. 
    What type of software hides certain things from the operating system?
    • A. 

      Rootkit

    • B. 

      Spyware

    • C. 

      Adware

    • D. 

      SCR

  • 7. 
    Which type of virus will change its form in order to avoid detection?
    • A. 

      Stealth

    • B. 

      Retrovirus

    • C. 

      Multipartite

    • D. 

      Polymorphic

  • 8. 
    Which of the following types of viruses modifies and alters other programs and databases?
    • A. 

      Phage

    • B. 

      Companion

    • C. 

      Macro

    • D. 

      Armored

  • 9. 
    Which of the following goals of information security refers to developing strategies and techniques to deal with an attack or loss?
    • A. 

      Detection

    • B. 

      Prevention

    • C. 

      Recursion

    • D. 

      Response

  • 10. 
    Which of the following access attacks amounts to someone routinely monitoring network traffic?
    • A. 

      Snooping

    • B. 

      Passive interception

    • C. 

      Eavesdropping

    • D. 

      Active interception

  • 11. 
    During which general type of attack does someone want to modify information in your system?
    • A. 

      Access

    • B. 

      Modification and repudiation

    • C. 

      Denial-of-service

    • D. 

      Interception

  • 12. 
    Which type of virus attacks a system in multiple ways?
    • A. 

      Stealth

    • B. 

      Retrovirus

    • C. 

      Multipartite

    • D. 

      Polymorphic

  • 13. 
    Which of the following is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements?
    • A. 

      Rootkit

    • B. 

      Grayware

    • C. 

      Adware

    • D. 

      SCR

  • 14. 
    Which of the following authentication protocols employs certificates that contain rights and access privileges of a bearer as part of its payload?
    • A. 

      CHAP

    • B. 

      Security token

    • C. 

      PAP

    • D. 

      Kerberos

  • 15. 
    Which of the following is a type of virus disguised as or within screen savers?
    • A. 

      Rootkit

    • B. 

      Grayware

    • C. 

      Adware

    • D. 

      SCR

  • 16. 
    Which type of virus often attacks the antivirus software installed on a computer?
    • A. 

      Stealth

    • B. 

      Retrovirus

    • C. 

      Multipartite

    • D. 

      Polymorphic

  • 17. 
    Which type of virus avoids detection by making itself indistinguishable from other applications?
    • A. 

      Stealth

    • B. 

      Retrovirus

    • C. 

      Multipartite

    • D. 

      Polymorphic

  • 18. 
    What type of software acts on behalf of a third party and collects information?
    • A. 

      Rootkit

    • B. 

      Spyware

    • C. 

      Adware

    • D. 

      SCR

  • 19. 
    Which of the following is a device that looks for open ports on a server?
    • A. 

      Scanner

    • B. 

      Freezer

    • C. 

      Sniffer

    • D. 

      Watchdog

  • 20. 
    Which of the following access attacks amounts to someone placing a computer between the sender and the receiver to capture information while it's sent?
    • A. 

      Snooping

    • B. 

      Passive interception

    • C. 

      Eavesdropping

    • D. 

      Active interception

  • 21. 
    Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?
    • A. 

      Back Orifice

    • B. 

      Dictionary

    • C. 

      Man-in-the-middle

    • D. 

      Brute force

  • 22. 
    Which of the following are popular examples of denial-of-service attacks? (Choose all that apply.)
    • A. 

      Buffer overflow

    • B. 

      Star of pain

    • C. 

      Ping of death

    • D. 

      Memlock

  • 23. 
    Which of the following is another name for active sniffing?
    • A. 

      War driving

    • B. 

      Chalking

    • C. 

      TCP/IP hijacking

    • D. 

      Apt cleanup

  • 24. 
    During which general type of attack does someone try to disrupt your network and services?
    • A. 

      Access

    • B. 

      Modification and repudiation

    • C. 

      Denial-of-service

    • D. 

      Interception

  • 25. 
    Which of the following goals of information security refers to identifying events when they occur?
    • A. 

      Detection

    • B. 

      Prevention

    • C. 

      Recursion

    • D. 

      Response

Back to Top Back to top