



Refresh Page To Play Again!!
Results
#1. The process of converting plaintext data into ciphertext data to prevent loss of confidentiality is known as?
#2. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?
#3. Which of the following is NOT true.
#4. Which of the following protocols is used in a Fraggle Attack?
#5. The ___________model provides the most granular level of access control.
#6. Hashing algorithms are used to enforce which of the following?
#7. What are two primary controls used by access control systems
#8. This attack looks at blocks of encrypted data to check and see if there is a pattern.
#9. This malware attacks the anti-virus software, attempting to disable the signature library.
#10. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
#11. Which Access Control Model uses and Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid
#12. What Authentication technology was designed to prevent a Man in the Middle attack?
#13. Both SMTP Buffer Overflow Attacks and DNS Query Malformed Packet Attacks affect which layer of the OSI model?
#14. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?
#15. Which protocol uses a three hand-shake to establish connectivity?
#16. A cryptographic attack based on a database of pre-computed hash values and the original plain text values.
#17. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.
#18. Which of the following statements is true.
#19. Well-known Ports are in what range?
#20. Which of the following is NOT accurate in the protocol and port number?
Results Back up Top