As an innovative company, SEC Technologies is continuously working on game-changing solutions to protect government agencies, organizations and companies of all sizes and industries against the increasing number of cyber-attacks.
This is a Cyber Security Quiz about SEC Technologies and Tools!
(A) Support voice and video transmissions
(B) Provide time synchronization
(C) Enable email usage
(D) Encrypt data-in-transit
Rate this question:
(A) NAC
(B) VPN
(C) IDS
(D) IPS
Rate this question:
(A) Support voice and video transmissions
(B) Provide time synchronization
(C) Enable email usage
(D) Encrypt data-in-transit
Rate this question:
(A) NAC
(B) VPN
(C) IDS
(D) IPS
Rate this question:
(A) FTP
(B) SSH
(C) SMTP
(D) HTTP
Rate this question:
(A) Wireless access point
(B) Firewall
(C) Layer 2 switch
(D) Bridge
Rate this question:
(A) Load balancing
(B) Clustering
(C) RAID
(D) Affinity scheduling
Rate this question:
(A) Wiredump
(B) Tcpdump
(C) Netcat
(D) Nmap
Rate this question:
(A) Phishing
(B) Zero-day
(C) Open-source intelligence
(D) Hoax
Rate this question:
(A) Banner grabbing
(B) Vulnerability scan
(C) password cracker
(D) Protocol analyzer
Rate this question:
(A) VLAN
(B) NAT
(C) UTM
(D) DNSSEC
Rate this question:
(A) The new service
(B) An ACL
(C) ServerA
(D) The VLAN
Rate this question:
(A) NIDS and HIDS
(B) NIPS and HIPS
SIEM and NIPS
SIEM and NIDS
Rate this question:
(A) SIEM
(B) Network mapper
(C) Network scanner
(D) Nmap
Rate this question:
(A) Firewall
(B) Layer 2 switch
(C) Proxy server
(D) Web server
Rate this question:
(A) Flood guard
(B) VLAN
(C) Port security
(D) Loop protection
Rate this question:
(A) A syn stealth scan
(B) Vulnerability scan
(C) Ping scan
(D) Penetration test
Rate this question:
(A) NAT
(B) SRTP
(C) SNMPv3
(D) DNSSEC
Rate this question:
(A) Stateless firewall
(B) Stateful firewall
(C) Web application firewall
(D) Host-based firewall
Rate this question:
(A) SCADA access
(B) Storage segmentation
(C) Database security
(D) Embedded RTOS
Rate this question:
(A) Mail gateway
(B) UTM appliance
(C) Forward proxy
(D) Reverse proxy
Rate this question:
(A) ifconfig
(B) ipconfig
(C) netstat
(D) tracert
Rate this question:
(A) IPS
(B) Proxy server
(C) Web application firewall
(D) Honeypot
Rate this question:
(A) DLP
(B) HSM
(C) COPE
(D) SED
Rate this question:
(A) Network-based
(B) Signature-based
(C) Heuristic-based
(D) Anomaly-based
Rate this question:
(A) False negatives
(B) False positives
(C) Signature-based
(D) Behavioral-based IDS
Rate this question:
(A) NIDS and HIDS
(B) NIPS and HIPS
(C) SIEM and NIPS
(D) SIEM and NIDS
Rate this question:
(A) An out-of-band IPS
(B) An in-band IPS
(C) A passive IDS
(D) An out-of-band IDS
Rate this question:
(A) Identify if a server is running a service using port 80 and is reachable.
(B) Launch an attack on a server sending 80 separate packets in a short period of time.
(C) Use Netcat to remotely administer the server
(D) Use Netcate to start an RDP session on the server.
Rate this question:
(A) Affinity
(B) Round-robin
(C) Airgap
(D) Mantrap
Rate this question:
(A) Add a flood guard to the network.
(B) Block all traffic from foreign countries.
(C) Implement an IPS.
(D) Disable the administrator accounts
Rate this question:
(A) Content inspection
(B) Malware inspection
(C) URL filter
(D) DDos mitigator
Rate this question:
(A) Load balancing
(B) Proxy server
(C) UTM
(D) Content inspection
Rate this question:
(A) SAML
(B) Diameter
(C) Kerberos
(D) LDAP
Rate this question:
(A) NAC
(B) DMZ
(C) SRTP
(D) VLAN
Rate this question:
(A) FTP
(B) SNMPv3
(C) SFTP
(D) SRTP
Rate this question:
(A) /var/log/btmp
(B) /var/log/fail
(C) var/log/httpd
(D) /var/log/kern
Rate this question:
(A) Reverse proxy
(B) Media gateway
(C) Web application firewall
(D) Mail gateway
Rate this question:
(A) NIDS
(B) NAC
(C) DLP
(D) DMZ
Rate this question:
(A) CCMP
(B) WPA2 Enterprise
(C) SSID broadcast
(D) MAC address filter
Rate this question:
(A) arp
(B) ipconfig
(C) netstat
(D) ping
Rate this question:
(A) Geofencing
(B) Geolocation
(C) GPS tagging
(D) Containerization
Rate this question:
(A) Nmap
(B) Netcat
(C) Wireshark
(D) SIEM
Rate this question:
(A) Network-based firewall
(B) Signature-based IDS
(C) Anomaly-base IDS
(D) Honeynet
Rate this question:
(A) Permanent
(B) Health
(C) RADIUS
(D) Dissolvable
Rate this question:
(A) Create rules to block all outgoing traffic from a private IP address.
(B) Implement a flood guard on switches.
(C) Add a web application firewall.
(D) Create rules to block all incoming traffic from a private IP address.
Rate this question:
(A) Arp
(B) Ipconfig
(C) Ping
(D) Netstat
Rate this question:
(A) NAT
(B) NAC
(C) VLAN
(D) DMZ
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Introduction To Cyber Security With Types Of Hackers
Explore the basics of cyber security, understand different types of hackers, and learn about ethical hacking through simple demonstrations.
Questions:
10 |
Attempts:
537 |
Last updated:
Mar 21, 2023
|
Technologies Of Cyber Security Quiz
The Internet is a vast place, therefore it is essential to take security measures to protect important data. Take this " Technologies Of Cyber Security Quiz " to find...
Questions:
10 |
Attempts:
3027 |
Last updated:
Jul 23, 2023
|
Cyber Security Awareness Quiz
Cyber security is defined as the protection of systems, networks, and data in cyberspace and is a critical issue for all businesses. One must ensure they protect themselves...
Questions:
7 |
Attempts:
1577 |
Last updated:
Mar 21, 2023
|
Fun Cyber Security Quiz
Are you confident in your understanding of the intricate details of cyber security? Designed to challenge your knowledge and expand your understanding, this quiz will take you...
Questions:
15 |
Attempts:
11020 |
Last updated:
May 09, 2025
|
Cyber Security Quiz Questions
Think you know about cyber security? Are you ready to take these Cyber Security Quiz Questions? There are many questions in this quiz related to cyber security to help assess your...
Questions:
20 |
Attempts:
35291 |
Last updated:
Mar 26, 2024
|
Cyber Ethics And Cyber Security
This quiz on 'Cyber Ethics and Cyber Security' tests knowledge on intellectual property, passwords, acceptable use policies, adware, hackers, and computer viruses. It enhances...
Questions:
14 |
Attempts:
1843 |
Last updated:
Mar 21, 2023
|
Wait!
Here's an interesting quiz for you.