IT Security Protocol Packets Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dilandilandilan
D
Dilandilandilan
Community Contributor
Quizzes Created: 1 | Total Attempts: 310
Questions: 9 | Attempts: 310

SettingsSettingsSettings
IT SecurITy Protocol Packets Quiz - Quiz

FINAL HELP FOR IT SECURITY ENJOY GUYS


Questions and Answers
  • 1. 

    Which of the following iptables rules would generate a destination unreachable error?

    • A.

      Iptables –A FORWARD –s 0/0 –d 0/0 –j ACCEPT

    • B.

      Iptables –A FORWARD –s 0/0 –d 0/0 –j DROP

    • C.

      Iptables –P FORWARD DROP

    • D.

      Iptables –A FORWARD –s 0/0 –d 0/0 –j REJECT

    • E.

      None of the above

    Correct Answer
    D. Iptables –A FORWARD –s 0/0 –d 0/0 –j REJECT
    Explanation
    iptables –A FORWARD –s 0/0 –d 0/0 –j REJECT

    Rate this question:

  • 2. 

    Standards for protocols and associated information are first published in?

    • A.

      InternNIC newsletters

    • B.

      ARPA

    • C.

      RFCs

    • D.

      IANA

    • E.

      RDPs

    Correct Answer
    C. RFCs
    Explanation
    RFCs

    Rate this question:

  • 3. 

    The ICMP protocol is specifically designed to:

    • A.

      Check & report on network error conditions

    • B.

      Generate networking stats

    • C.

      Control traffic flow across networks

    • D.

      Track end-to-end connectivity

    • E.

      None of the above

    Correct Answer
    A. Check & report on network error conditions
    Explanation
    Check & report on network error conditions

    Rate this question:

  • 4. 

    Which of the following is an example of egress filtering?

    • A.

      Having your gateway router block inbound traffic from "private IPs" (ex192.168.x.x)

    • B.

      Only allowing traffic to leave you network with a source IP in your company's IP range

    • C.

      Installing a spam filter on your mail server

    • D.

      Only allowing traffic into your network with a source IP not in your company's IP range

    • E.

      Having the firewall ensure that traffic from public IP’s can’t get into your network

    Correct Answer
    B. Only allowing traffic to leave you network with a source IP in your company's IP range
    Explanation
    Only allowing traffic to leave you network with a source IP in your company's IP range

    Rate this question:

  • 5. 

    Of all the vulnerabilities listed below, which is considered the hardest to harden against?

    • A.

      Low physical security

    • B.

      Active services

    • C.

      Open ports

    • D.

      The human element

    • E.

      Bad passwords

    Correct Answer
    D. The human element
    Explanation
    The human element

    Rate this question:

  • 6. 

    In security environments, Authorization means

    • A.

      Confirming your identity with an element unique to the person

    • B.

      Supplying your identity

    • C.

      Using your identity to assign access rights

    • D.

      Tracking what users are doing while accessing the systems

    • E.

      None of the above

    Correct Answer
    C. Using your identity to assign access rights
    Explanation
    Using your identity to assign access rights
    Supplying your identity

    both of these answers are correct.

    Rate this question:

  • 7. 

    It is possible to capture packets from the network that are not destined for your machine.

    • A.

      False

    • B.

      True

    Correct Answer
    B. True
    Explanation
    True (that’s what a packet sniffer does !)

    Rate this question:

  • 8. 

    A friend lends you the latest INXS music CD he just purchased. You take it home and make a copy. Have you broken any laws?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    Yes

    Rate this question:

  • 9. 

    During a packet capture, you notice a couple of TCP packets with the “F” flag and some “A” flags. What is likely going on?

    • A.

      A TCP/IP session setup process

    • B.

      An ICMP Request / Reply process

    • C.

      An ARP process

    • D.

      A UDP-based FTP session

    • E.

      A TCP/IP session shutdown process

    Correct Answer
    E. A TCP/IP session shutdown process
    Explanation
    A TCP/IP session shutdown process

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 21, 2010
    Quiz Created by
    Dilandilandilan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.