PRESS START TO BEGIN; REFRESH PAGE TO PLAY AGAIN!
Results
#1. A Banking institution needs to implement controls to ensure that the job roles and responsibilities do not cause a conflict of interest within the organization. Which model would best help prevent this from happening?
#2. A cryptographic attack based on a database of pre-computed hash values and the original plain text values.
#3. Which of the following is NOT accurate in the protocol and port number?
#4. This Layer of the OSI model provides independence from differences in data representation (encryption) by translating from application to network format, and vice versa
#5. The science of scrambling, or encrypting, data. Which also includes the study of algorithms and other methods that help protect the confidentiality of data is referring to which of the following.
#6. What are two primary controls used by access control systems
#7. Which of the following is the correct order of the OSI Model?
#8. Which of the following is NOT true.
#9. This malware attacks the anti-virus software, attempting to disable the signature library.
#10. This Layer of the OSI model provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
#11. Hashing algorithms are used to enforce which of the following?
#12. Telnet, FTP, SMTP, DNS reside on which layer of the TCP/IP Model
#13. What Authentication technology was designed to prevent a Man in the Middle attack?
#14. Which part of the TCP/IP model do IP, ICMP, ARP, IGMP operate?
#15. The process of converting plaintext data into ciphertext data to prevent loss of confidentiality is known as?
#16. When planning for redundant power sources in a server deployment, which of the following should be purchased? (Select TWO).
Select all that apply:
#17. Both SMTP Buffer Overflow Attacks and DNS Query Malformed Packet Attacks affect which layer of the OSI model?
#18. What layer(s) on the OSI Model’s Data and Physical layers corresponding to in the TCP/IP model ?
#19. You are currently employed as an Security Administrator and need to be able to grant access for a user based on their assigned job role. The role requires the user to access files at a certain time of the day. Which of the following would you use to accomplish this task?
#20. Cross-Site Scripting Attacks take place at which level of the OSI model?
THE OSI MODEL
ATTACKS AT THE OSI MODEL LEVELS