Information security test has the answer P3
Information security is an essential job in the technology era 4.0 today. Good security will help your data and information avoid unnecessary risks for your personal and business. Please read below with the Network Administrator for information security and privacy through multiple-choice questions below.
- Question 1. Which of the following statements best describes a white hat hacker?
- Security specialist
- Former Hacker black hat
- Former Hacker gray hat
- Malicious hackers
-
- Question 2. What is the first stage of hacking?
- Maintain access
- Gaining access
- Reconnaissance
- Detection (Scanning)
-
- Question 3. When a hacker tries to attack a server over the Internet it is called the attack type?
- Attack from a distance
- Physical access attack
- Local access
- Attack attacks internal
-
- Question 4. Which of the following tools is a tool to perform undetected footprinting?
- Whois search
- Traceroute
- Ping sweep
- Host scanning
-
- Question 5. What will be the next step after footprinting?
- Scanning
- Enumeration
- System hacking
- Active information gathering
-
- Question 6. What is Footprinting?
- Measure the trail of a moral hacker
- Accumulate data by collecting information about a goal
- Scan a target network to detect operating systems of all kinds
- The physical layout of a target network
-
- Question 7. What is the best reason to implement a security policy?
- Increase security
- It makes it harder to enforce security
- Restrict employee rights
- Reduce security
-
- Question 8. What port does FTP use?
- 21
- 23
- 25
- 80
-
- Question 9. Which port is used by HTTPS?
- 21
- 80
- 443
- 53
-
- Question 10. What is Trojan Horse?
- A malicious program that steals your username and password
- An unauthorized user who collects access to your user database and adds himself as a user
- Causing harm like fake code or replacing legal code
- A server that is to sacrifice for all hacking attempts to log in and monitor hacking activities
-
4.5 ★ | 2 Vote
You should read it
- What you need to know about an information security analyst
- Information security test has answers - Part 2
- Things to know about an information system security manager
- Learn about information security engineers
- How to improve information security for schools
- Information security test?
- Test of knowledge about Security
- Security tips for Google, Facebook and online services
- The first set of books about hackers and network information security in Vietnam is coming soon
- Multiple choice questions about network security implementation have P2 answers
- 4 web browsers pay great attention to security
- Information security - Where to start?
Maybe you are interested
Learn about Phind: The app that answers questions about coding with the power of AI
24 basic level C++ programming interview questions and answers
20 intermediate level C++ programming interview questions and answers
15 expert-level C++ programming interview questions and answers
Answering questions about the reasons for using a keyboard wrist rest
How to add branches or nested questions in Google Forms