Network Security MCQ

1. In most systems, a user logging in would be asked to ____________________ herself.

Answer

Correct Answer: Identify

Note: This Question is unanswered, help us to find answer for this one

2. In the lab, you enabled __________ in windows firewall to allow the http connection.

Answer

Correct Answer: A predefined rule

Note: This Question is unanswered, help us to find answer for this one

3. When designing a security policy, many organizations follow a standard set of ____________________.

Answer

Correct Answer: Principles

Note: This Question is unanswered, help us to find answer for this one

4. The __________ is a form of tcp scanning that is less intrusive on the target host.

Answer

Correct Answer: SYN scan

Note: This Question is unanswered, help us to find answer for this one

5. Smtp server listens on port ______ and pop3 listens on port ________.

Answer

Correct Answer: 25,110.

Note: This Question is unanswered, help us to find answer for this one

6. Security keys are more ideal than otp generators because they're resistant to _______ attacks.

Answer

Correct Answer: Phishing

Note: This Question is unanswered, help us to find answer for this one

7. Ethernet lan networks utilize the physical _________________ address to send packets.

Answer

Correct Answer: Media Access Control (MAC)

Note: This Question is unanswered, help us to find answer for this one

8. The announcement of an operational csirt should minimally include ____.

Answer

Correct Answer: Contact methods and numbers

Note: This Question is unanswered, help us to find answer for this one

9. The ____ handles computer crimes that are categorized as felonies.

Answer

Correct Answer: FBI

Note: This Question is unanswered, help us to find answer for this one

10. In 802.1x, the heavy authentication work is done on ________.

Answer

Correct Answer: Neither A nor B

Note: This Question is unanswered, help us to find answer for this one

11. Closing all routes of attack into an organization's system(s) is called ________.

Answer

Correct Answer: Comprehensive security

Note: This Question is unanswered, help us to find answer for this one

12. By default, the pfsense firewall __________ outbound access from the lan interface.

Answer

Correct Answer: Allows unrestricted

Note: This Question is unanswered, help us to find answer for this one

13. ________ is one method of thwarting dos attacks by dropping all ip packets from an attacker.

Answer

Correct Answer: Black holing

Note: This Question is unanswered, help us to find answer for this one

14. An idps __________________ server is the central repository for sensor and agent data.

Answer

Correct Answer: Management

Note: This Question is unanswered, help us to find answer for this one

15. Acls filter packets by using a __________ base to determine whether to allow a packet to pass.

Answer

Correct Answer: Rule

Note: This Question is unanswered, help us to find answer for this one

16. A dmz is a subnet of _____________ accessible servers placed outside the internal network.

Answer

Correct Answer: Publicly

Note: This Question is unanswered, help us to find answer for this one

17. When a wireless device looks for beacon frames it is known as ____________________.

Answer

Correct Answer: Scanning

Note: This Question is unanswered, help us to find answer for this one

18. All modern programming languages support ____ types of relational comparison operators.

Answer

Correct Answer: Six

Note: This Question is unanswered, help us to find answer for this one

19. A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

Answer

Correct Answer: False attack stimulus

Note: This Question is unanswered, help us to find answer for this one

20. If the eap authentication is successful, a success packet is sent to the ____________________.

Answer

Correct Answer: Supplicant

Note: This Question is unanswered, help us to find answer for this one

21. A unique characteristic of the 802.11 data frame is its ____ field.

Answer

Correct Answer: Sequence Control

Note: This Question is unanswered, help us to find answer for this one

22. A vpn ____ authenticates vpn clients and establishes tunnels for vpn connections.

Answer

Correct Answer: Concentrator

Note: This Question is unanswered, help us to find answer for this one

23. A directional antenna issues wireless signals along a(n) ____ direction.

Answer

Correct Answer: Signal

Note: This Question is unanswered, help us to find answer for this one

24. The result from anding 11001111 with 10010001 is ____.

Answer

Correct Answer: 10000001

Note: This Question is unanswered, help us to find answer for this one

25. A nos that contains a back dooris an example of a risk associated with ____.

Answer

Correct Answer: Protocols and software

Note: This Question is unanswered, help us to find answer for this one

26. In 802.11i, ________ authentication always uses ssl/tls.

Answer

Correct Answer: Outer

Note: This Question is unanswered, help us to find answer for this one

27. A padded cell is a hardened honeynet. _________________________

Answer

Correct Answer: Honeypot

Note: This Question is unanswered, help us to find answer for this one

28. Dns poisoning _____.

Answer

Correct Answer: Substitutes DNS addresses so that the computer is automatically redirected to another device

Note: This Question is unanswered, help us to find answer for this one

29. _____ is a satellite-based tracking system that enables users to determine a persons position.

Answer

Correct Answer: Global positioning system

Note: This Question is unanswered, help us to find answer for this one

30. _________________ uses a device's gps to define geographical boundaries where an app can be used.

Answer

Correct Answer: Geo-fencing

Note: This Question is unanswered, help us to find answer for this one

31. A ________ attack is when a webserver is flooded with application layer web requests.

Answer

Correct Answer: HTTP flood

Note: This Question is unanswered, help us to find answer for this one