



Refresh Page To Play Again!!
Results
#1. Hashing algorithms are used to enforce which of the following?
#2. Which Access Control Model uses and Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid
#3. This malware attacks the anti-virus software, attempting to disable the signature library.
#4. This attack looks at blocks of encrypted data to check and see if there is a pattern.
#5. Which of the following protocols is used in a Fraggle Attack?
#6. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?
#7. Which protocol uses a three hand-shake to establish connectivity?
#8. The ___________model provides the most granular level of access control.
#9. The science of scrambling, or encrypting, data. Which also includes the study of algorithms and other methods that help protect the confidentiality of data is referring to which of the following.
#10. This model is a state machine model used for enforcing access control in government and military applications, it enforces confidentiality. No read up, No write down
#11. What are two primary controls used by access control systems
#12. Cross-Site Scripting Attacks take place at which level of the OSI model?
#13. A cryptographic attack based on a database of pre-computed hash values and the original plain text values.
#14. ______ algorithms provide one-way encryption and are sometimes referred to as one-way functions
#15. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.
#16. Which of the following statements is true.
#17. Which of the following is the correct order of the OSI Model?
#18. Which of the following protocols is used in a Smurf attack?
#19. A Banking institution needs to implement controls to ensure that the job roles and responsibilities do not cause a conflict of interest within the organization. Which model would best help prevent this from happening?
#20. (MAC) Address spoofing takes place and affects which layer of the OSI model?
Results Back up Top