



Refresh Page To Play Again!!
Results
#1. This malware attacks the anti-virus software, attempting to disable the signature library.
#2. The ___________model provides the most granular level of access control.
#3. Telnet, FTP, SMTP, DNS reside on which layer of the TCP/IP Model
#4. Which of the following protocols is used in a Fraggle Attack?
#5. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.
#6. The process of converting plaintext data into ciphertext data to prevent loss of confidentiality is known as?
#7. A Banking institution needs to implement controls to ensure that the job roles and responsibilities do not cause a conflict of interest within the organization. Which model would best help prevent this from happening?
#8. The science of scrambling, or encrypting, data. Which also includes the study of algorithms and other methods that help protect the confidentiality of data is referring to which of the following.
#9. Which of the following protocols is used in a Smurf attack?
#10. What are two primary controls used by access control systems
#11. This model is a state machine model used for enforcing access control in government and military applications, it enforces confidentiality. No read up, No write down
#12. ______ algorithms provide one-way encryption and are sometimes referred to as one-way functions
#13. (MAC) Address spoofing takes place and affects which layer of the OSI model?
#14. Which Access Control Model uses and Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid
#15. Which of the following is the correct order of the OSI Model?
#16. Which part of the TCP/IP model do IP, ICMP, ARP, IGMP operate?
#17. Cross-Site Scripting Attacks take place at which level of the OSI model?
#18. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
#19. Which of the following statements is true.
#20. What Authentication technology was designed to prevent a Man in the Middle attack?
Results Back up Top