1. What does IP mean?
2. When cookies are used as session identifiers, how are they then used as a potential security hazard?
3. Is true that HTTP is an insecure protocol?
4. In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
5. Digital signatures provide which of the following ?
6. Which of the following are possible security threats?
7. What does TCP mean?
8. Which of the following is a valid Internet Security requirement?
9. How to avoid Man-in-the-middle attacks?
10. What is Internet Protocol Security?
11. What happens during the TCP attack; Denial of Service?
12. Which of the following are valid Cryptographic key types?
13. Which of the following symmetric keys can be derived from Symmetric master key?
14. Which of the following is valid difference between a Virus and a Spyware ?
15. What is a firewall?
16. Which is the best way a system can be hardened?
17. Why is it crucial to encrypt data in transit?
18. Which of the following are the basic functionalities of the IPsec Protocol ?
19. Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
20. True of False? Malware exists which affects both Windows and Linux systems.
21. Can a proxy be used as a firewall? If so, how?
22. A digital signature scheme consists of which of the following typical algorithms ?
23. In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
24. Which of the following is TRUE about TLS?
25. What is one way that a web browser is vulnerable to breaching?
26. What is another name for an insecure plugin?
27. Which of the following is TRUE about SSL 3.0?
28. What is a computer worm?
29. What two main categories of network topologies are there?
30. There are two types of firewall. What are they?
31. Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
32. Which of the following is a VALID type of Key Management System?
33. Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
34. If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?
35. Which of the following protocol used Port 443 and Port 80 respectively
36. Is a Unix-based system vulnerable to viruses?
37. Which of the following is the collective name for Trojan horses, spyware, and worms?
38. What is network topology?
39. What are TLS and SSL?
40. What happens to your data when it is encrypted?
41. What does cross-site scripting allow for attackers?
42. Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
43. Modern secure password storage should implement:
44. Who was TLS defined by?
45. Trojan Horse programs operate with what intent?
46. What is another name for Internet Layer?
47. What does the acronym BEAST mean in Beast Attack?
48. Which of the following is true about Public Key Encryption?
49. Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
50. An SQL injection is often used to attack what?
51. Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
52. If you set up a BUS network, what is the major disadvantage?
53. Which of the following is a valid flaw of SSL 2.0 ?
54. Why is a virtual machine considered a sandboxing method?
55. Which of the following type of attack can actively modify communications or data?
56. How are port numbers categorized?
57. When is encrypted data the safest?
58. Which of the following keys are used to generate random numbers?
59. Secure Sockets Layer is a predecessor of which cryptographic protocol?
60. What is largely considered the most advanced computer virus?
61. According to OWASP what is the most dangerous web vulnerability?
62. Which of the following threats corresponds with an attacker targeting specific employees of a company?
63. Sandboxing does what to computer programs?
64. Which version of TLS is vulnerable to BEAST exploit?
65. How can cookies be used to mitigate cross-site scripting?
66. Which of the following is a VALID authorization key?
67. What are the two primary classifications of cross-site scripting?
68. What does a cryptographic key do within the Internet Layer?
69. What is a method to fend off a Sockstress attack?
70. Which of the following is a VALID digital signature key?
71. Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
72. Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
73. Which of the following represents a cryptographic key that is intended to be used for a long period of time?
74. What is the less secure AES encryption mode?
75. Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
76. Which of the following is a VALID ephemeral key?
77. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
78. Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
79. What does the Linux kernal use to sandbox running programs?
80. Which of the following HTTP method is considered insecure ?
81. Which of the following is not a VALID type of firewall?
82. Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
83. In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?
84. All of the following are valid cryptographic hash functions EXCEPT:
85. Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
86. Which of the below listed are included in Application hardening?
87. Which is sign of Security breach?
88. Which is the advantages of Honeypots?
89. Which thing should be kept in mind while managing passwords?
90. Which Symmetric encryption algorithm is/are supported by S/MI
91. Which is Email Security protocols?
92. Which can be classified as passive attacks?
93. Select the common VPN protocols.
94. Which Vulnerability assessment tools?
95. Which measure taken to enhance the security of the system? (Select all that apply)
96. Which method can be used for Network hardening?
97. Which is the components of IPSec?
98. Which appliance help/s in filtering virus packets?
99. Select the objectives of E-mail security.
100. Which protocol use UDP:
101. Which goal cannot be achieved with Symmetric cryptography?
102. The ability to exploit a vulnerability is called:
103. Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?
104. Which protocol helps in securing LDAP?
105. By which third party is Digital Certificates signed?
106. Which Asymmetric encryption algorithms is supported by S/MIME?
107. Which is the standard certificate?
108. Which is an application attack?
109. In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?
110. In which protocol does an SYN attack help to find a weakness?
111. Which is an Asymmetric algorithm?
112. Which helps us to block attacks on a single machine?
113. What is the key length of Triple DES?
114. Which protocol is used by TACACS+?
115. Which key is used to decrypt the message in PKI?
116. Which statement resemble Trojan horses?
117. Which port is used by PPTP?
118. Below are the given statements, which statement shows the breach of Availability:
119. A criminal who breaks into computers maliciously is known as
120. What is function of IPS?
121. The process of switching protocols between routing devices is called
122. A Brute Force attack
123. Which statement is true of Tunneling?
124. Which detect/s security weaknesses in a remote or local host?
125. By which can the injection of bogus routes into the core network be prevented ?
126. Mike wants to secure the data on his personal computer. Which option will he choose to secure the data?
127. Which protocol is used to secure the WAP communication?
128. The part of a company’s intranet which is extended to users outside the company is called:
129. Which protocol does not help in securing the FTP?
130. By which method can social engineering be curbed by?
131. The concept of allowing access to resources only to those permitted is known as
132. How many keys are required if two parties communicate using Symmetric cryptography?
133. Which key help us in the verification of the Digital Signature?
134. What is RBL in E-mail Security?
135. Which technique is used to approach security in Java?
136.
What does RBL contain?
137. What is RSA in cryptography?
138. Which is the key principles of Internet Security?
139. Which is created to serve as a snare for intruders?
140. What is S/MIME?
141. Which can be transmitted through an E-mail?
142. Joe wants to secure his client’s Web Server. Which measures will he take?
143. What is a UTM appliance?
144. In which Buffer Overflow help us to find weaknesses?
145. In which attack, sending a large number of spoofed ICMP ECHO requests to broadcast address?
146. Which port does IKE key negotiation protocol use?
147. Which type of authentication is.'Something the user has ' ?
148. Which protocol is used by RADIUS?
149. Which can be classified as code and cryptographic attacks?
150. A positive detection of result that is false or untrue is called
151. Which Symmetric algorithm has variable key length?
152. Which statement shows the breach of Integrity:
153. Which is Application-level security protocol are used for communications session security?
154. Which is the placement modes of an IDS/IPS?
155. Which is the components of a UTM appliance?
156. Which technique is used to approach security in ActiveX?
157. Which is the component of PKI?
158. What is the feature of an IPS?
159. Which authentication protocol is used to encrypt passwords?
160. Which is Transport Layer Security protocols?
161. Select the drawbacks of Symmetric key cryptography.
162. Which is Virus propagation techniques?
163. ____ are one method to control websites that can track your content on the internet.
164. A ________ can be used to gather network information or user data.
165. A(n) ________ uses the internet to create a secure network connection.
166. In most us states, consent is required for _______ recording but not for ________ recording.
167. The ____ was established to secure and monitor security risks to u.s. networks and the internet.
168. Strong security is needed to ________.
169. With _____, phone calls are treated as just another kind of data.
170. Telnet protocol packets usually go to tcp port ____.
171. The icmp packet field____ provides error detection for the icmp header only.