1) A filename: run32d11 a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 2) Malware running at the SYSTEM level of privilege: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 3) Check out this amazing: <ahref=“https://trusted.foo”>website</a><script src=“https://badsite.foo/hook.js”></script>. a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 4) If a threat actor enters the string ’ or 1=1-- in the "enter name" field and this input is not sanitized: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 5) Cryptographic Hash Algorithms: a) WPA3 b) MD5 c) WEP d) AES e) SHA f) Digital Signatures 6) Uses a Private Key and a Public Key: a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 7) Uses a single secret key to both encrypt and decrypt data. a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 8) A short and noncomplex password is most vulnerable to this type of attack: a) Dictionary b) XSS c) Brute force d) SQL injection e) Phishing f) Social Engineering 9) An ASCII representation of binary value: a) MD5 b) Base64 c) WEP d) AES e) WPA3 f) DLL 10) Proves that a message or digital certificate has not been altered or spoofed: a) Digital Signature b) Cryptographic Hash c) Key Exchange d) Packet Sniffer e) Firewall f) Footprinting 11) Having "significantly" as a password can leave you open to which attack? a) Brute Force b) XSS c) SQL Injection d) on-path e) Dictionary f) evil twin 12) What is Wireshark? a) Wi-Fi Analyzer b) Packet Sniffer c) Cryptographic Hashing Algorithm d) Heuristic software e) Key Exchange f) Antivirus 13) Yesterday at work the Wi-Fi was named "ACMEwifi". Today it is named "ACM3wifi". What threats are occurring? a) Evil Twin b) Trojan c) on-path d) SQL injection e) XSS f) Spoofing 14) An information-gathering threat in which the attacker attempts to learn about the configuration of the network and security systems: a) spoofing b) insider threat c) footprinting d) on-path e) social engineering f) DDos 15) Compromising 1 or 2 machines to use for C&C is the first step in which attack? a) SQL injection b) DoS c) DDoS d) XSS e) on-path f) Brute Force 16) The web uses what to implement a secure connection? a) Digital Certificates b) Digital Signatures c) Key Exchange d) TLS e) SSH f) RDP
0%
Network Security 1
공유
만든이
Lasvegasitinstr
콘텐츠 편집
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?