Refresh Page To Play Again!!
Results
HD Quiz powered by harmonic design
#1. What are two primary controls used by access control systems
#2. ______ algorithms provide one-way encryption and are sometimes referred to as one-way functions
#3. Well-known Ports are in what range?
#4. This attack looks at blocks of encrypted data to check and see if there is a pattern.
#5. A Banking institution needs to implement controls to ensure that the job roles and responsibilities do not cause a conflict of interest within the organization. Which model would best help prevent this from happening?
#6. You are currently employed as an Security Administrator and need to be able to grant access for a user based on their assigned job role. The role requires the user to access files at a certain time of the day. Which of the following would you use to accomplish this task?
#7. (MAC) Address spoofing takes place and affects which layer of the OSI model?
#8. The ___________model provides the most granular level of access control.
#9. This Layer of the OSI model provides independence from differences in data representation (encryption) by translating from application to network format, and vice versa
#10. What Authentication technology was designed to prevent a Man in the Middle attack?
#11. Which of the following is the correct order of the OSI Model?
#12. Cross-Site Scripting Attacks take place at which level of the OSI model?
#13. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?
#14. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
#15. Which of the following is NOT accurate in the protocol and port number?
#16. This Layer of the OSI model provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node
#17. Which part of the TCP/IP model do IP, ICMP, ARP, IGMP operate?
#18. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.
#19. Which of the following is NOT true.
#20. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?
Results Back up Top