1) A filename: run32d11 a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 2) Malware running at the SYSTEM level of privilege: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 3) Check out this amazing: <ahref=“https://trusted.foo”>website</a><script  src=“https://badsite.foo/hook.js”></script>. a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 4) If a threat actor enters the string ’ or 1=1-- in the "enter name" field and this input is not sanitized: a) Ransomware b) Trojan c) keylogger d) XSS e) SQL injection f) rootkit 5) Cryptographic Hash Algorithms: a) WPA3 b) MD5 c) WEP d) AES e) SHA f) Digital Signatures 6) Uses a Private Key and a Public Key: a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 7) Uses a single secret key to both encrypt and decrypt data. a) Symmetric Encryption b) Digital Signatures c) SHA d) Asymmetric Encryption e) Key Exchange f) MD5 8) A short and noncomplex password is most vulnerable to this type of attack: a) Dictionary b) XSS c) Brute force d) SQL injection e) Phishing f) Social Engineering 9) An ASCII representation of binary value: a) MD5 b) Base64 c) WEP d) AES e) WPA3 f) DLL 10) Proves that a message or digital certificate has not been altered or spoofed: a) Digital Signature b) Cryptographic Hash c) Key Exchange d) Packet Sniffer e) Firewall f) Footprinting 11) Having "significantly" as a password can leave you open to which attack? a) Brute Force b) XSS c) SQL Injection d) on-path e) Dictionary f) evil twin 12) What is Wireshark? a) Wi-Fi Analyzer b) Packet Sniffer c) Cryptographic Hashing Algorithm d) Heuristic software e) Key Exchange f) Antivirus 13) Yesterday at work the Wi-Fi was named "ACMEwifi". Today it is named "ACM3wifi". What threats are occurring? a) Evil Twin b) Trojan c) on-path d) SQL injection e) XSS f) Spoofing 14) An information-gathering threat in which the attacker attempts to learn about the configuration of the network and security systems: a) spoofing b) insider threat c) footprinting d) on-path e) social engineering f) DDos 15) Compromising 1 or 2 machines to use for C&C is the first step in which attack? a) SQL injection b) DoS c) DDoS d) XSS e) on-path f) Brute Force 16) The web uses what to implement a secure connection? a) Digital Certificates b) Digital Signatures c) Key Exchange d) TLS e) SSH f) RDP

Network Security 1

tarafından

Skor Tablosu

Görsel stil

Seçenekler

Şablonu değiştir

Otomatik olarak kaydedilen geri yüklensin mi: ?