1) A filename: run32d11 a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 2) Malware running at the SYSTEM level of privilege: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 3) Check out this amazing: <ahref=“https://trusted.foo”>website</a><script src=“https://badsite.foo/hook.js”></script>. a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 4) If a threat actor enters the string ’ or 1=1-- in the "enter name" field and this input is not sanitized: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 5) Cryptographic Hash Algorithms: a) WPA3 b) MD5 c) WEP d) AES e) SHA f) Digital Signatures 6) Uses a Private Key and a Public Key: a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 7) Uses a single secret key to both encrypt and decrypt data. a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 8) A short and noncomplex password is most vulnerable to this type of attack: a) Dictionary b) XSS c) Brute force d) SQL injection e) Phishing f) Social Engineering 9) An ASCII representation of binary value: a) MD5 b) Base64 c) WEP d) AES e) WPA3 f) DLL 10) Proves that a message or digital certificate has not been altered or spoofed: a) Digital Signature b) Cryptographic Hash c) Key Exchange d) Packet Sniffer e) Firewall f) Footprinting 11) Having "significantly" as a password can leave you open to which attack? a) Brute Force b) XSS c) SQL Injection d) on-path e) Dictionary f) evil twin 12) What is Wireshark? a) Wi-Fi Analyzer b) Packet Sniffer c) Cryptographic Hashing Algorithm d) Heuristic software e) Key Exchange f) Antivirus 13) Yesterday at work the Wi-Fi was named "ACMEwifi". Today it is named "ACM3wifi". What threats are occurring? a) Evil Twin b) Trojan c) on-path d) SQL injection e) XSS f) Spoofing 14) An information-gathering threat in which the attacker attempts to learn about the configuration of the network and security systems: a) spoofing b) insider threat c) footprinting d) on-path e) social engineering f) DDos 15) Compromising 1 or 2 machines to use for C&C is the first step in which attack? a) SQL injection b) DoS c) DDoS d) XSS e) on-path f) Brute Force 16) The web uses what to implement a secure connection? a) Digital Certificates b) Digital Signatures c) Key Exchange d) TLS e) SSH f) RDP
0%
Network Security 1
共享
由
Lasvegasitinstr
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
随堂测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?