курсера 151-300

курсера 151-300

University

30 Qs

quiz-placeholder

Similar activities

NCM 110 A - PRELIM EXAM

NCM 110 A - PRELIM EXAM

University

30 Qs

ITIL key term quiz

ITIL key term quiz

University

30 Qs

CH 10 Land use quiz

CH 10 Land use quiz

9th Grade - University

25 Qs

Uttunga Technical Team Round 1 (2022)

Uttunga Technical Team Round 1 (2022)

University

30 Qs

Waterfowl: Conservation  I, II, III, IV, Final

Waterfowl: Conservation I, II, III, IV, Final

9th Grade - University

30 Qs

NCM 110 B - PRELIM EXAM

NCM 110 B - PRELIM EXAM

University

30 Qs

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

BUIT

BUIT

University

34 Qs

курсера 151-300

курсера 151-300

Assessment

Quiz

Science

University

Easy

Created by

Alikhan Aitzhanov

Used 8+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

· An XML Gateway.

· An application-level firewall.

· A packet-filtering firewall.

· All of the above.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which statement about Stateful firewalls is True?

· They have state tables that allow them to compare current packets with previous packets.

· They are less secure in general than Stateless firewalls.

· They are faster than Stateless firewalls.

· All of the above.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?

· Known Plaintext

· Known Ciphertext

· Brute force

· Social Engineering

· Rainbow tables

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

What are two (2) drawbacks to using symmetric key encryption?

· The sender and recipient must find a secure way to share the key itself.

· You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.

· Symmetric key encryption is slower than asymmetric key encryption.

· A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.

6.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?

· Firewalls and Antivirus

· Effective Communications and Critical Thinking

· Teamwork and Public

· Speaking Networking and Programming

· Leadership and Organization

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?”

· The Open Web Application Security Project (OWASP) Framework.

· The Information Technology Infrastructure Library (ITIL) framework.

· IT Security

· The CIA Triad.

· The Business Process Management Framework.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?