You are on page 1of 19

Based with SANS Technology Institute, it is the process of making preventative measures to

keep the underlying networking infrastructure from any unauthorized access.

Select one:
a.
Application Security
b.
Network Security
c.
Cyber Security
d.
Security
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An abbreviation that is consider as the brains of the computer.
CPU
Answer: 

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a way on improving basic security. (Choose all that applies)

Select one or more:


a.
Reuse password
b.
Download software to any website available

c.
Use easy to remember password

d.
Ignore Updates
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This is a way of adding secondary layer of security to your account password.

Select one:
a.
Biometric Authentication
b.
Two-factor authentication

c.
OTP Codes
d.
Complex Password
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Data Link Layer enables data transfer between two devices on the same network.

Select one:
True 
False

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of these are not part of the reason why network security is important (Choose all that
applies)

Select one or more:


a.
To expose company assets

b.
To keep your job as network administrator

c.
To gain a competitive advantage

d.
To take advantage of competitors confidential information
Feedback
Your answer is correct.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of using social skills to encourage people to disclose their credentials

Select one:
a.
Phishing

b.
Social Engineering

c.
Spam

d.
Tailgating
Feedback
Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is designed to appear as a legit program to gain access to a network.
Trojan horse
Answer: 

Question 9
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Type of software that is often called as end-user programs.
Application software
Answer: 

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a type of an injection attack that makes it possible to insert and execute malicious SQL
statements

Select one:
a.
SQL Injection

b.
Buffer Overflow

c.
SOL Injection
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Worm has the ability to replicate itself without a host program and spread independently
while viruses rely on human activity to spread and damage a system or file.

Select one:
True 
False

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A set of instructions and execute a specific task/s
Software
Answer: 

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Combination of brute force and dictionary attack.
Hybrid attack
Answer: 

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An attack that allows any unauthorized users a way or passage to get inside a restricted
area.

Tailgating attack
Answer: 

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An act that exploits a weakness in a system.

Select one:
a.
Vulnerabilities

b.
Attack

c.
Threat

d.
Malware
Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information policy where the data should be access by an authorized person/s only.
Confidentiality
Answer: 

Question 17
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Refers to the information system which ensures that the information remains accurate.
Reliable
Answer: 

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is sometimes called TCP hijacking attack.

Select one:
a.
IP Spoofing

b.
Sniffer

c.
DoS and DDoS Attacks

d.
Man-in-the-middle attack
Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00
Flag question

Question text
It is an end-to-end layer used to deliver messages to a host

Select one:
a.
Session Layer

b.
Network Layer

c.
Physical Layer

d.
Transport Layer
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In implementing network security, company should invest more in preventing or avoiding
any security breach over detecting and responding to any form of attack

Select one:
True 
False

Question 21
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Any form of security incident that is properly handled can and eventually will turn into a
bigger problem.

Select one:
True
False 

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a combined set of components for collecting, storing and processing data and for
providing information, facts and knowledge.

Select one:
a.
Information System
b.
Database Management System

c.
Computer System
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00
Flag question

Question text
This attack tries to defeat an authentication mechanism by systematically entering each
word in a dictionary as a password.

Select one:
a.
Hybrid Attack

b.
Dictionary Attack

c.
Brute-Force Attack
Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Layer that is responsible for establishing and maintaining connections.

Select one:
a.
Physical Layer

b.
Session Layer

c.
Network Layer

d.
Presentation Layer
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This attack uses any password-cracking software to mathematically calculate every possible
password.

Select one:
a.
Hybrid Attack

b.
Dictionary Attack

c.
Brute-Force Attack
Feedback
Your answer is correct.

Question 26
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
It is a security solution by organization to notice any malicious activity in a network.

Network Security
Answer: 
Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of these are not part of security model that is very popular to information security. 

Select one:
a.
Assurance

b.
Confidentiality

c.
Integrity

d.
Availability
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is any program that is harmful to a computer user.

Select one:
a.
Worm

b.
Virus
c.
Trojan horse

d.
Malware
Feedback
Your answer is correct.

Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Adware is a type of malware that restricts user access to the computer either by encrypting
files on the hard drive or locking down the system

Select one:
True
False 

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It serves as a proof and verifies that you are the person you say you are or what you claim to
be.

Select one:
a.
Authorization

b.
Accountability
c.
Authentication

d.
Availability
Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Attack that send an email that contains attachment that loads malware onto your computer
Phishing
Answer: 

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the foundation for all security policies.

Select one:
a.
Prevention

b.
Security Trinity

c.
Response

d.
Detection
Feedback
Your answer is correct.

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This attack happens when the attacker or hacker sends too much information to the
application causing it to overflow
Buffer Overflow
Answer: 

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It has an additional ability where they can modify security settings of a software.

Select one:
a.
Spyware

b.
Malware

c.
Ransomware

d.
Adware
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the connection of two or more computer that share its resources
network
Answer: 

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
OSI Layer that is sometimes called HCI layer.
Application layer
Answer: 

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A software that can detect malware.

Select one:
a.
Firewall

b.
Scanner
c.
Antivirus Software
d.
Application Software
Feedback
Your answer is correct.

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It's anything that can interrupt the operation, functioning, integrity, or availability of a
network or system.

Select one:
a.
Attack
b.
Malware

c.
Threat

d.
Vulnerabilities
Feedback
Your answer is correct.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
it is the one managing the computer hardware resources in addition to applications and
data.

Select one:
a.
Information System
b.
Application Software

c.
System Software

d.
Operating System
Feedback
Your answer is correct.

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An attack where the hacker mimics another employee in the company.
Impersonation
Answer: 

You might also like