Capture34
shutterstock_248790175
insider
zeroes and ones

Refresh Page To Play Again!!

 

Results

HD Quiz powered by harmonic design

#1. What are two primary controls used by access control systems

#2. ______ algorithms provide one-way encryption and are sometimes referred to as one-way functions

#3. Well-known Ports are in what range?

#4. This attack looks at blocks of encrypted data to check and see if there is a pattern.

#5. A Banking institution needs to implement controls to ensure that the job roles and responsibilities do not cause a conflict of interest within the organization. Which model would best help prevent this from happening?

#6. You are currently employed as an Security Administrator and need to be able to grant access for a user based on their assigned job role. The role requires the user to access files at a certain time of the day. Which of the following would you use to accomplish this task?

#7. (MAC) Address spoofing takes place and affects which layer of the OSI model?

#8. The ___________model provides the most granular level of access control.

#9. This Layer of the OSI model provides independence from differences in data representation (encryption) by translating from application to network format, and vice versa

#10. What Authentication technology was designed to prevent a Man in the Middle attack?

#11. Which of the following is the correct order of the OSI Model?

#12. Cross-Site Scripting Attacks take place at which level of the OSI model?

#13. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?

#14. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

#15. Which of the following is NOT accurate in the protocol and port number?

#16. This Layer of the OSI model provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node

#17. Which part of the TCP/IP model do IP, ICMP, ARP, IGMP operate?

#18. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.

#19. Which of the following is NOT true.

#20. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?

Previous
Finish

 

Results Back up Top