Just a try to see if it can be done before Odie wakes up.
CHAP
Certificate
Kerberos
Smart Cards
Rate this question:
Single sign-on
Decentralized management
Discretionary Access Control (DAC)
Need to know
Rate this question:
Cookies
Buffer Overflows
CGI
SMTP relay
Rate this question:
Insider theft
Shoulder surfing
Dumpster diving
Phishing
Rate this question:
DNS poisoning
Domain hijacking
Spoofing
Kiting
Rate this question:
Least privilege
Access control
Defense in depth
Separation of duties
Rate this question:
RBAC
DAB
None of the above
MAC
Rate this question:
Multiple logins are allowed
Lack of security awareness
Audit logs are not monitored frequently
Strong passwords are not required
Rate this question:
A man in the middle attack
Social engineering
A penetration test
A vulnerability scan
Rate this question:
Back door
Social engineering
Password guessing
Man in the middle
Rate this question:
Sniffer
Smurfer
Fragmenter
Spoofer
Rate this question:
Create user and workstation roles
Create mailbox, and file and printer roles
Create Finance, Sales, Research and Development, and Production roles
Create allow access and deny access roles.
Rate this question:
Looking through a co-worker’s trash
Impersonation
Piggybacking
Looking over a co-workers shoulder to retrieve information
Rate this question:
Identifying the use case
Creating a security policy
Vulnerability testing
Installing sodftware patches
Rate this question:
It is used to provide a persistent, customized web experience for each visit
It receives more data than it is programmed to accept
It has a feature designed into many email servers that allows them to forward email to other email servers
It’s an older form of scripting that was used extensively in early web systems
Rate this question:
A phishing attack
Social engineering
A Trojan horse
A man-in-the-middle attack
Rate this question:
Worm
Logic bomb
Rootkit
Virus
Rate this question:
Contact the employee's supervisor regarding disposition of user accounts
Hange the employee's user password and keep the data for a specified period
Disable the employee's user accounts and delete all data
Disable the employee's accounts and keep the data for a specified period
Rate this question:
Acceptable use
Need to know
Separation of duties
Dual control
Rate this question:
Snooping
Eavesdropping
Interception
None of the above
Rate this question:
Logic bomb
Virus
Worm
Trojan horse
Rate this question:
Syntax error
Denial of service (DoS)
Brute force
Buffer overflow
Rate this question:
Spam
A hoax
Packet sniffing
Phishing
Rate this question:
Monitor
Removal
Recovery
Containment
Rate this question:
Back door
Worm
Zombie
Trojan
Rate this question:
Worms are a form of malicious code while Trojan horses are not
Worms are distributed through email messages while Trojan horses do not
Worms self replicate while Trojan horses do not
There is no difference between a worm and a Trojan horse
Rate this question:
Hoaxes can help educate users about a virus
Hoaxes carry a malicious payload and can be destructiv
Hoaxes can create as much damage as a real virus
Hoaxes are harmless pranks and should be ignored
Rate this question:
Worm
Trojan horse
Virus
Spyware
Rate this question:
Maintenence
Monitering and administration
Guidelines and enforcement
Implementation
Rate this question:
Rootkit
Worm
Logic bomb
Trojan
Rate this question:
Back Door Attacks
Man In The Middle
Replay Attack
Spoofing
Rate this question:
Implicite deny
Seperation of duties
Job rotation
Least privelege
Rate this question:
Role Based Access Control (RBAC)
Decentralized management
Centralized management
Single sign-on
Rate this question:
SSO
Biometrics
Mutual authentication
Multifactor authentication
Rate this question:
Logic bomb
Worm
Trojan horse
Virus
Rate this question:
A locked, windowless building
A company with a dedicated information technology (IT) security staff
A public building that has shared office space
A company with a help desk whose personnel have minimal training
Military facility with computer equipment containing biometrics
Rate this question:
Email scanner
Malware scanner
Anti-spam scanner
Adware scanner
Rate this question:
Role Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
List Based Access Control (LBAC)
Rate this question:
Spoofing
Kiting
DNS poisoning
Domain hijacking
Rate this question:
Someone looking through your files
Involve someone who routinely monitors network traffic
Listening or overhearing parts of a conversation
Placing a computer system between the sender and receiver to capture information
Rate this question:
The role or responsibilities users have in the organization
The system administrator
The owner of the resource
None of the above
Rate this question:
SYN attack
Smurf attack
Birthday attack
Buffer Overflow attack
Rate this question:
Magnetic lock and pin
Smartcard and proximity readers
Biometric reader and smartcard
Combination locks and key locks
Rate this question:
Implicit deny
Implicit allow
Time of day restrictions
Mandatory vacations
Rate this question:
Virus
Adware
Zombie
Worm
Rate this question:
DDoS
Man-in-the-middle
DoS
TCP/IP hijacking
Rate this question:
Social engineering
Dictionary attacks
Man in the middle attacks
DoS (Denial of Service) attacks
Rate this question:
The DRP coordinator
The organization’s security officer
The senior management
The security technician
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
English Exam Questions And Answers- 2
If you have an upcoming exam, or just want to enhance your knowledge, just take our amazing online quiz with interesting quiz questions. From the following answers select the...
Questions:
10 |
Attempts:
4063 |
Last updated:
Oct 14, 2024
|
Prelims Exclusive Quiz - Day 1
The idea is to keep the MCQs to a practicable level so that you do not spend an extra minute than required, and have maximum output for the UPSC Prelims Exam 2020. Questions would...
Questions:
10 |
Attempts:
181 |
Last updated:
Mar 14, 2023
|
|
UGC NET PAPER 1
It is an MCQs based on the UGC NET Syllabus. It consists of 10 questions and carries 2 marks each. All questions are compulsory.here.
Questions:
10 |
Attempts:
515 |
Last updated:
Mar 21, 2023
|
MH-CET Online Daily Exam By NIT
This daily online exam by NIT focuses on specific administrative and admission details for 2020, including faculty count and establishment year.
Questions:
6 |
Attempts:
48 |
Last updated:
Nov 20, 2024
|
CDC 1C873 RAWs UREs Quiz: Vol.1 Questions
Dive into the world of CDC 1C873 RAWs UREs with our Vol.1 Quiz! Test your knowledge on Critical Design Configuration (CDC) 1C873, Reactor Assembly Worksheets (RAWs), and...
Questions:
79 |
Attempts:
377 |
Last updated:
Dec 21, 2023
|
ULA FINAL EXAM INTERMEDIATE II
This exam evaluates knowledge of innovative technologies including wing-suits, solar-powered water distillers, and technological misconceptions.
Questions:
72 |
Attempts:
509 |
Last updated:
Mar 22, 2023
|
Wait!
Here's an interesting quiz for you.