Test of knowledge about Security
- Question 1. What is phishing?
-
It is a type of denial of service attack
-
It is a technique used by malicious users to steal other users' information such as credit card numbers, passwords, bank account information or other private information by speaking Subdue or deceive users for a number of reasons
-
Is a technique used to catch data packets on the network
-
It is a spyware
-
No answer
-
- Question 2. Which protocol is responsible for protecting IP traffic on the network?
-
IPsec
-
VPN
-
SSL
-
PGP
-
There is no answer
-
- Question 3. Which of the protocols listed below protects email traffic?
-
SMTP
-
POP
-
SSL
-
S / MIME
-
No answer
-
- Question 4. With symmetric encryption algorithms we can say:
-
DES, triple DES, RC4 and RC5 are examples of symmetric encryption algorithms
-
To work, transmitters and receivers need to agree on a private key before sharing information
-
Different symmetric algorithms have different sizes
-
All answers are correct
-
No answer
-
- Question 5. Which attack is based on sending an ICMP packet larger than its original size to the target machine?
-
Session stealing
-
SYN Flooding
-
Ping of Death
-
Sniffer
-
No answer
-
- Question 6. Which encryption protocol is used on the wireless network?
-
WEP
-
MD5
-
MAC
-
HMAC
-
No answer
-
- Question 7. . is the network inspection department looking for suspicious behavior and allowing some actions to be taken.
-
Antivirus
-
Antispyware
-
Intruder detection systems (IDS)
-
Routers
-
No answer
-
- Question 8. Can be used as biometric verification
-
Handwritten strokes
-
Face recognition
-
Fingerprint
-
Eyes
-
All answers above
-
- Sentence 9. In September 1996, hackers attacked an internet service provider in New York. They sent 50 SYN packets per second to computers, making these computers unable to handle this large amount of information and stopped working. What kind of attack is this attack?
-
Phishing
-
Ping of Death
-
DoS
-
Sniffer
-
No answer
-
- Question 10. What is social engineering?
-
Use unique computers as a tool to convince victims to disclose their sensitive personal information
-
Installation of a sniffer on the corporate network to check what users are doing and accessing?
-
Make up a third person by using his personal data such as full name, home address and social security number to increase system access
-
It is a conspiracy that is intended to get all the information of users including sending phishing emails
-
No answer
-
You should read it
- Information security test has the answer P3
- Information technology test P5
- Your understanding of information technology - Part 2
- What do you know about P2 software technology
- What do you know about software technology P1
- Information technology test
- Test basic knowledge about computers
- Testing about P2 system maintenance
- What you need to know about an information security analyst
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network security implementation have P2 answers
- Test on maintenance of P3 system
Maybe you are interested
A pair of galaxies with unique question mark shapes discovered
Learn about Phind: The app that answers questions about coding with the power of AI
24 basic level C++ programming interview questions and answers
20 intermediate level C++ programming interview questions and answers
15 expert-level C++ programming interview questions and answers
Answering questions about the reasons for using a keyboard wrist rest