Cyberecurity Ess 2

Quiz
•
Computers
•
University
•
Hard

Joan Lim
Used 3+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which method tries all possible passwords until a match is found?
brute force
rainbow tables
dictionary
birth date
Answer explanation
Two common methods of cracking hashes are dictionary and brute force. Given time, the brute force method will always crack a password.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the standard for a public key infrastructure to manage digital certificates?
x.509
x.503
PKI
NIST-SP800
Answer explanation
The x.509 standard is for a PKI infrastructure and x.500 if for directory structures.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
It can take only a fixed length message.
Two different files can be created that have the same output.
It has a variable length output.
Answer explanation
Understanding the properties of a hash function shows its applicability such as one-way function, arbitrary input length, and fixed output.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same codeword to login into a website. This means both would have the exact same hash for their codewords. What could be implemented to prevent both codeword hashes from being the same?
peppering
RSA
salting
pseudo-random generator
Answer explanation
A password is stored as a combination of both a hash and a salt.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A company is concerned with malicious traffic from malware that flows through the network. What technology can be put in place to detect potential malware traffic on the network?
IPS
IDS
Firewall
NAC
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Why should WEP not be used in wireless networks today?
easily cracked
its age
its lack of encryption
its use of clear text passwords
Answer explanation
Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?
OS
syslog
Windows
audit
Answer explanation
Audit logs can track user authentication attempts on workstations and can reveal if any attempts at break-in were made.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Machine Learning Quiz

Quiz
•
University
15 questions
OS Quiz-1

Quiz
•
University
16 questions
MS Powerpoint

Quiz
•
University
10 questions
CompTIA A+ 220-1001

Quiz
•
University
10 questions
Step to Solve Problem in Computer Programming

Quiz
•
University
15 questions
DBMS LAB QUIZ

Quiz
•
University
15 questions
Types of Artificial Intelligence

Quiz
•
University
9 questions
Module 7-DHCPv4

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University