Capture34
shutterstock_248790175
insider
zeroes and ones

Refresh Page To Play Again!!

 

Results

#1. The process of converting plaintext data into ciphertext data to prevent loss of confidentiality is known as?

#2. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?

#3. Which of the following is NOT true.

#4. Which of the following protocols is used in a Fraggle Attack?

#5. The ___________model provides the most granular level of access control.

#6. Hashing algorithms are used to enforce which of the following?

#7. What are two primary controls used by access control systems

#8. This attack looks at blocks of encrypted data to check and see if there is a pattern.

#9. This malware attacks the anti-virus software, attempting to disable the signature library.

#10. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

#11. Which Access Control Model uses and Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid

#12. What Authentication technology was designed to prevent a Man in the Middle attack?

#13. Both SMTP Buffer Overflow Attacks and DNS Query Malformed Packet Attacks affect which layer of the OSI model?

#14. VPN Man-in-the-Middle Attacks take place and affect which layer of the OSI model?

#15. Which protocol uses a three hand-shake to establish connectivity?

#16. A cryptographic attack based on a database of pre-computed hash values and the original plain text values.

#17. Which Access Control Model uses predefined set of rules used in environments where different levels of security exist.

#18. Which of the following statements is true.

#19. Well-known Ports are in what range?

#20. Which of the following is NOT accurate in the protocol and port number?

Previous
Finish

 

Results Back up Top