Security + Systems Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joelcg
J
Joelcg
Community Contributor
Quizzes Created: 5 | Total Attempts: 5,427
| Attempts: 448 | Questions: 42
Please wait...
Question 1 / 42
0 %
0/100
Score 0/100
1. Which file extension is used to indicate a JPEG file?

Explanation

The extension for a JPEG file is .jpg. The extension for a Java applet is .jar. The extension on Java source code is .java. The extension for a JavaScript file is .js.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

Never take security for granted – the right software, hardware or physical protection can be pivotal in keeping you, your personal information and your belongings from the wrong... see morehands. What do you know about the topic of security? see less

2. What is the term used when an application receives more data than it is programmed to accept?

Explanation

When an application receives more data than it is programmed to accept, it is a buffer overflow. The application will either terminate or write data beyond the allocated space. A cookie is a text file that a browser maintains on a user's hard disk in order to store information about the user. SMTP Relay is an email feature that is intended to allow the server to forward email to other servers. Open Relay is a type of SMTP Relay that is being exploited.

Submit
3. What is the term used for a text file that a browser maintains on a user's hard disk in order to store information about the user?

Explanation

A cookie is a text file that a browser maintains on a user's hard disk in order to store information about the user. When an application receives more data than it is programmed to accept, it is a buffer overflow. The application will either terminate or write data beyond the allocated space. SMTP Relay is an email feature that is intended to allow the server to forward email to other servers. Open Relay is a type of SMTP Relay that is being exploited.

Submit
4. Which type of virus attacks a system in multiple ways?

Explanation

A multipartite virus attacks a system in multiple ways. A polymorphic virus will change its form in order to avoid detection. A stealth virus avoids detection by making itself indistinguishable from other applications. A retrovirus attacks, or bypasses, the antivirus software installed on a computer.

Submit
5. Which of the following is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements?

Explanation

Spyware is software that acts on behalf of a third party and collects information. Adware is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements. Rootkits have become popular and work by hiding certain things (such as running processes) from the operating system. SCR viruses are those that are disguised as or within screen savers.

Submit
6. Which type of virus avoids detection by making itself indistinguishable from other applications?

Explanation

A stealth virus avoids detection by making itself indistinguishable from other applications. A retrovirus attacks, or bypasses, the antivirus software installed on a computer. A multipartite virus attacks a system in multiple ways. A polymorphic virus will change its form in order to avoid detection.

Submit
7. What type of software acts on behalf of a third party and collects information?

Explanation

Spyware is software that acts on behalf of a third party and collects information. Rootkits have become popular and work by hiding certain things (such as running processes) from the operating system. Adware is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements. SCR viruses are those that are disguised as or within screen savers.

Submit
8. Which language is seen as a successor to HTML and offers many capabilities that HTML does not?

Explanation

eXtensible Markup Language (XML) is seen as a successor to HTML and offers many capabilities that HTML does not. The other choices are all languages that predate HTML or are not seen as successors to HTML.

Submit
9. Which of the following are common ways to provide secure connections between a web client and a web server? (Choose two.)

Explanation

Both Secure Socket Layer/Transport Layer Security (SSL/TLS) and HTTP Secure (HTTPS) are common ways to provide secure connections between a web client and a web server. Regardless of which is used, port 443 is utilized. The other two choices are not valid protocols for providing secure connections between a web client and a web server.

Submit
10. Which of the following goals of information security refers to identifying events when they occur?

Explanation

The three primary goals of information security are prevention, detection, and response. Detection refers to identifying events when they occur. Prevention refers to preventing computer or information violations from occurring. Response refers to developing strategies and techniques to deal with an attack or loss.

Submit
11. Which of the following goals of information security refers to preventing computer or information violations from occurring?

Explanation

The three primary goals of information security are prevention, detection, and response. Prevention refers to preventing computer or information violations from occurring. Detection refers to identifying events when they occur. Response refers to developing strategies and techniques to deal with an attack or loss.

Submit
12. What is the term used for an email feature intended to allow the server to forward email to other servers?

Explanation

SMTP Relay is an email feature that is intended to allow the server to forward email to other servers. When an application receives more data than it is programmed to accept, it is a buffer overflow. The application will either terminate or write data beyond the allocated space. A cookie is a text file that a browser maintains on a user's hard disk in order to store information about the user. Open Relay is a type of SMTP Relay that is being exploited.

Submit
13. Which type of virus often attacks the antivirus software installed on a computer?

Explanation

A retrovirus attacks, or bypasses, the antivirus software installed on a computer. A stealth virus avoids detection by making itself indistinguishable from other applications. A multipartite virus attacks a system in multiple ways. A polymorphic virus will change its form in order to avoid detection.

Submit
14. During which general type of attack does someone want to modify information in your system?

Explanation

During a modification and repudiation attack, someone wants to modify information in your system(s). A denial-of-service (DoS) attack tries to disrupt your network and services. In an access attack, someone who should not be able to have access wants access to your resources. Interception is a type of access attack but not a general attack category.

Submit
15. During which general type of attack does someone try to disrupt your network and services?

Explanation

A denial-of-service (DoS) attack tries to disrupt your network and services. In an access attack, someone who should not be able to have access wants access to your resources. During a modification and repudiation attack, someone wants to modify information in your system(s). Interception is a type of access attack but not a general attack category type.

Submit
16. Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?

Explanation

Back Orifice is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack. Brute-force attacks and dictionary attacks are password-guessing attacks, while man-in-the-middle is its own type of attack and not a type of remote administration attack.

Submit
17. Which of the following is not one of the main components of the security triad?

Explanation

The three components of the computer security triad that interact to provide a reasonably secure environment are physical, operational, and management.

Submit
18. What type of software hides certain things from the operating system?

Explanation

Rootkits have become popular and work by hiding certain things (such as running processes) from the operating system. Spyware is software that acts on behalf of a third party and collects information. Adware is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements. SCR viruses are those that are disguised as or within screen savers.

Submit
19. You want to block all web traffic on the firewall, with and without SSL. Which port(s) should you block? (Choose all that apply.)

Explanation

Standard web traffic uses port 80. When SSL is used (HTTPS), traffic is conducted on port 443. You don't need to block the other ports.

Submit
20. Which of the following access attacks amounts to someone placing a computer between the sender and the receiver to capture information while it's sent?

Explanation

While all the choices listed are various types of access attacks, only in an active interception attack is a computer placed between the sender and receiver to capture information while it's sent. In a snooping attack, someone looks through your files in hopes of finding something interesting. In a passive interception attack, someone routinely monitors network traffic. In an eavesdropping attack, the attacker listens in on or overhears parts of a conversation.

Submit
21. Which of the following is a device that looks for open ports on a server?

Explanation

A scanner is a device that looks for open ports. A sniffer is a device that captures and displays network traffic. Neither a freezer nor a watchdog is a valid network device used for this purpose.

Submit
22. Which type of virus will change its form in order to avoid detection?

Explanation

A polymorphic virus will change its form in order to avoid detection. A stealth virus avoids detection by making itself indistinguishable from other applications. A retrovirus attacks, or bypasses, the antivirus software installed on a computer. A multipartite virus attacks a system in multiple ways.

Submit
23. Which file extension is used to indicate a JavaScript file?

Explanation

The extension for a JavaScript file is .js. The extension for a JPEG file is .jpg. The extension for a Java applet is .jar. The extension on Java source code is .java.

Submit
24. Which of the following goals of information security refers to developing strategies and techniques to deal with an attack or loss?

Explanation

The three primary goals of information security are prevention, detection, and response. Response refers to developing strategies and techniques to deal with an attack or loss. Detection refers to identifying events when they occur. Prevention refers to preventing computer or information violations from occurring.

Submit
25. Java applets run in a restricted area of memory. What is this restricted area known as?

Explanation

The restricted area of memory that Java applets run in is the sandbox. The other options do not represent the restricted area of memory that Java applets run in.

Submit
26. Which of the following are popular examples of denial-of-service attacks? (Choose all that apply.)

Explanation

Both the ping of death and buffer overflow attacks are popular examples of denial-of-service (DoS) attacks. The other options given are fictitious and not popular examples of DoS attacks.

Submit
27. Which of the following is a type of virus disguised as or within screen savers?

Explanation

SCR viruses are those that are disguised as or within screen savers. Grayware is a classification for software that is annoying; this includes spyware (which acts on behalf of a third party and collects information) and adware. Adware is often used to generate unwanted/unsolicited pop-up advertisements. Rootkits have become popular and work by hiding certain things (such as running processes) from the operating system.

Submit
28. Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?

Explanation

NetBus is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack. Brute-force attacks and dictionary attacks are password-guessing attacks, while man-in-the-middle is its own type of attack and not a type of remote administration attack.

Submit
29. What is the term used for an exploited email feature originally intended to allow the server to forward email to other servers?

Explanation

Open Relay is a type of SMTP Relay that is being exploited. When an application receives more data than it is programmed to accept, it is a buffer overflow. The application will either terminate or write data beyond the allocated space. A cookie is a text file that a browser maintains on a user's hard disk in order to store information about the user. SMTP Relay is an email feature that is intended to allow the server to forward email to other servers.

Submit
30. Which protocol is used to manage group or multicasting sessions?

Explanation

Internet Group Management Protocol (IGMCP) is used to manage group or multicasting sessions. Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Control Message Protocol (ICMP) is used to report errors and reply to requests from programs such as ping and traceroute. Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP.

Submit
31. Which of the following are the most popular spoofing attacks? (Choose two.)

Explanation

The two most common, or popular, spoofing attacks today are IP spoofing and DNS spoofing. The other choices do not represent the most popular spoofing attacks.

Submit
32. Which of the following is another name for active sniffing?

Explanation

Active sniffing is more commonly known as TCP/IP hijacking. The other choices given are not valid names for active sniffing.

Submit
33. Which of the following is the process of systematically identifying a network and its security posture?

Explanation

Footprinting is the process of systematically identifying a network and its security posture. Packet sniffing is the process of monitoring data that is transmitted across a network. Scanning is the process that attackers use to gather information about how your network is configured. Signal analysis/intelligence involves methods used to gain information about your environment including footprinting and scanning.

Submit
34. Which of the following types of viruses modifies and alters other programs and databases?

Explanation

A phage virus modifies and alters other programs and databases. A companion virus attaches itself to a legitimate program and then creates a program with a different file extension. A macro virus exploits the macro ability in many application programs. An armored virus is designed to make itself difficult to detect or analyze.

Submit
35. Which of the following authentication protocols employs certificates that contain rights and access privileges of a bearer as part of its payload?

Explanation

Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match. Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket.

Submit
36. During which general type of attack does someone who should not be able to get access attempt to get to your resources?

Explanation

In an access attack, someone who should not be able to get it wants access to your resources. During a modification and repudiation attack, someone wants to modify information in your system(s). A denial-of-service (DoS) attack tries to disrupt your network and services. Interception is a type of access attack but not a general attack category type.

Submit
37. Which type of IM attack is intended to disrupt existing systems by injecting or flooding a channel with garbage data?

Explanation

Jamming is intended to disrupt existing systems by injecting or flooding a channel with garbage data. A DoS attack in IM can take the form of many windows popping open as soon as the user tries to close one. A malformed MIME message can cause buffer overflow.

Submit
38. Which of the following file extensions would not indicate an executable file?

Explanation

The .bat extension is used for batch files. The .com extension is used on command files. The .exe extension is used on executable files. All of these are executable files.

Submit
39. Which of the following access attacks amounts to someone routinely monitoring network traffic?

Explanation

All the choices listed are various types of access attacks. In a passive interception attack, someone routinely monitors network traffic. In a snooping attack, someone looks through your files in hopes of finding something interesting. In an eavesdropping attack, the attacker listens in on or overhears parts of a conversation. In an active interception attack, a computer is placed between the sender and receiver to capture information while it's sent.

Submit
40. Which of the following is the process that attackers use to gather information about how your network is configured?

Explanation

Scanning is the process that attackers use to gather information about how your network is configured. Packet sniffing is the process of monitoring data that is transmitted across a network. Footprinting is the process of systematically identifying a network and its security posture. Signal analysis/intelligence involves methods used to gain information about your environment including footprinting and scanning.

Submit
41. Which type of instant messaging (IM) problem can occur from a malformed MIME message?

Explanation

A malformed MIME message can cause buffer overflow. Jamming is intended to disrupt existing systems by injecting or flooding a channel with garbage data. A DoS attack in IM can take the form of many windows popping open as soon as the user tries to close one.

Submit
42. Which type of instant messaging (IM) attack can occur when a user closes one window and dozens of others suddenly pop open?

Explanation

A denial-of-service (DoS) attack in IM can take the form of many windows popping open as soon as the user tries to close one. Jamming is intended to disrupt existing systems by injecting or flooding a channel with garbage data. A malformed MIME message can cause buffer overflow.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 06, 2011
    Quiz Created by
    Joelcg
Cancel
  • All
    All (42)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which file extension is used to indicate a JPEG file?
What is the term used when an application receives more data than it...
What is the term used for a text file that a browser maintains on a ...
Which type of virus attacks a system in multiple ways?
Which of the following is a type of spyware that is often used to...
Which type of virus avoids detection by making itself...
What type of software acts on behalf of a third party and collects...
Which language is seen as a successor to HTML and offers many...
Which of the following are common ways to provide secure connections...
Which of the following goals of information security refers to...
Which of the following goals of information security refers to...
What is the term used for an email feature intended to allow the...
Which type of virus often attacks the antivirus software installed on...
During which general type of attack does someone want to modify...
During which general type of attack does someone try to disrupt your...
Which of the following is a remote administration tool used by...
Which of the following is not one of the main components of the...
What type of software hides certain things from the operating system?
You want to block all web traffic on the firewall, with and without...
Which of the following access attacks amounts to someone placing a ...
Which of the following is a device that looks for open ports on a...
Which type of virus will change its form in order to avoid detection?
Which file extension is used to indicate a JavaScript file?
Which of the following goals of information security refers to ...
Java applets run in a restricted area of memory. What is this...
Which of the following are popular examples of denial-of-service...
Which of the following is a type of virus disguised as or within...
Which of the following is a remote administration tool used by...
What is the term used for an exploited email feature originally...
Which protocol is used to manage group or multicasting sessions?
Which of the following are the most popular spoofing attacks? (Choose...
Which of the following is another name for active sniffing?
Which of the following is the process of systematically identifying a...
Which of the following types of viruses modifies and alters other...
Which of the following authentication protocols employs certificates ...
During which general type of attack does someone who should not be...
Which type of IM attack is intended to disrupt existing systems by...
Which of the following file extensions would not indicate an...
Which of the following access attacks amounts to someone routinely...
Which of the following is the process that attackers use to gather...
Which type of instant messaging (IM) problem can occur from a...
Which type of instant messaging (IM) attack can occur when a user...
Alert!

Advertisement