Computer Networking Security Pre-Test Questions - 750 Verified Questions

Page 1


Computer Networking Security

Pre-Test Questions

Course Introduction

Computer Networking Security is a comprehensive course that delves into the principles, architectures, and protocols fundamental to securing computer networks. The course explores various topics such as encryption methods, authentication mechanisms, secure network designs, firewalls, intrusion detection systems, and emerging threats in network security. Students will learn to identify vulnerabilities, implement defense strategies, and understand the role of security policies and best practices in protecting data as it traverses local and global networks. Through theoretical knowledge and practical labs, students gain hands-on experience in configuring secure networks and responding to real-world security incidents.

Recommended Textbook

CompTIA Security Guide to Network Security Fundamentals 6th Edition by Mark Ciampa

Available Study Resources on Quizplus

15 Chapters

750 Verified Questions

750 Flashcards

Source URL: https://quizplus.com/study-set/2311 Page 2

Chapter 1: Introduction to Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45966

Sample Questions

Q1) Which of the following are considered threat actors? (Choose all that apply. )

A)brokers

B)competitors

C)administrators

D)individuals

Answer: A,B

Q2) Select the term that best describes automated attack software?

A)open-source utility

B)insider software

C)open-source intelligence

D)intrusion application

Answer: C

Q3) What level of security access should a computer user have to do their job?

A)password protected

B)least amount

C)limiting amount

D)authorized access

Answer: B

Q4) What are the four different risk response techniques?

Answer: Accept,transfer,avoid,and mitigate.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Malware and Social Engineering Attacks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45967

Sample Questions

Q1) Explain how an appender infection works.

Answer: The virus first appends itself to the end of a file.It then moves the first three bytes of the original file to the virus code and replaces them with a "jump" instruction pointing to the virus code.When the program is launched,the jump instruction redirects control to the virus.

Q2) What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

A)key indexing

B)ransomware

C)passive tracking

D)keylogger

Answer: D

Q3) A virus self-replicates on the host computer and spreads to other computers by itself.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Basic Cryptography

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45968

Sample Questions

Q1) If using the MD5 hashing algorithm,what is the length to which each message is padded?

A)32 bits

B)64 bits

C)128 bits

D)512 bits

Answer: D

Q2) The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

A)True

B)False

Answer: True

Q3) Explain how a hash algorithm works and how it is primarily used.

Answer: A hash algorithm creates a unique "digital fingerprint" of a set of data.This process is called hashing,and the resulting fingerprint is a digest (sometimes called a message digest or hash)that represents the contents.Hashing is used primarily for comparison purposes.

Q4) What four basic protections can cryptography support?

Answer: Cryptography can support confidentiality,integrity,authentication,and non-repudiation.

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Advanced Cryptography and PKI

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45969

Sample Questions

Q1) What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks,and each block is then encrypted separately?

A)Electronic Code Book

B)Galois/Counter

C)Cipher Block Chaining

D)Counter

Q2) What process will remove all private and public keys along with the user's identification information in the CA?

A)suspension

B)deletion

C)destruction

D)revocation

Q3) What protocol uses SSL or TLS to secure communications between a browser and a web server?

Q4) What are the three areas of protection provided by IPSEC?

Q5) List the three PKI trust models that use a CA.

Q6) Stream ciphers work on multiple characters at a time.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Networking and Server Attacks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45970

Sample Questions

Q1) How does a cross-site request forgery (XSRF)attack work?

Q2) If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?

A)spoofing

B)URL hijacking

C)Web squatting

D)typo hijacking

Q3) The malicious content of an XSS URL is confined to material posted on a website

A)True

B)False

Q4) How is a network-based MITM attack executed?

Q5) What specific ways can a session token be transmitted? (Choose all that apply. )

A)In the URL.

B)In the trailer of a frame.

C)In the header of a packet.

D)In the header of the HTTP requisition.

Q6) Securing web applications is easier than protecting other systems.

A)True

B)False

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Network Security Devices, Design, and Technology

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45971

Sample Questions

Q1) How does a Unified Threat Management (UTM)security product help reduce administrative overhead?

Q2) What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

A)system call

B)unit call

C)hardware instruction

D)system exception

Q3) Select the technology that can be used to examine content through application-level filtering.

A)Application gateway

B)Security proxy

C)Web security gateway

D)Firewall

Q4) The OSI model breaks networking steps down into a series of six layers.

A)True

B)False

Q5) What are the two TCP/IP protocols that are used by mail servers for clients accessing incoming mail?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Administering a Secure Network

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45972

Sample Questions

Q1) What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?

Q2) In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?

A)Application as a Service

B)Infrastructure as a Service

C)Software as a Service

D)System as a Service

Q3) Select the email protocols that are not secure? (Choose all that apply. )

A)TLS

B)S/MIME

C)POP

D)IMAP

Q4) What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

A)centralized device log analyzer

B)core device log analyzer

C)network log device

D)system log manager

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45973

Sample Questions

Q1) Which encryption protocol below is used in the WPA2 standard?

A)AES-CCMP

B)AES-CTR

C)AES-TKIP

D)AES-SCMP

Q2) What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

A)active twin

B)authorized twin

C)internal replica

D)evil twin

Q3) What term below is used to describe an attack that sends unsolicited messages to Bluetooth enabled devices?

A)Bluesnarfing

B)Bluejacking

C)Bluecracking

D)Bluetalking

Q4) How does the WPA Temporal Key Integrity Protocol encryption technology operate?

Q5) What are the four types of packets used by EAP?

Q6) What is the most common type of wireless access control?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Client and Application Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45974

Sample Questions

Q1) Which of the following are application development stages? (Choose all that apply. )

A)analysis

B)proofing

C)testing

D)staging

Q2) A Wi-Fi enabled microSD card is an example of what type of device?

A)PCIe

B)mobile card

C)SDIO

D)Secure Digital

Q3) Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )

A)Disabling unnecessary ports and services

B)Employing least functionality

C)Password auditing

D)Disabling default accounts/passwords

Q4) When securing a laptop,it can be placed in an office or a desk drawer.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Mobile and Embedded Device Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45975

Sample Questions

Q1) What PIN is considered to be the most commonly used PIN?

A)1234

B)4321

C)0000

D)7777

Q2) What is the Internet of Things (IoT)?

Q3) How does BYOD increase employee performance?

Q4) Infrared light is next to the visible light on the light spectrum.

A)True

B)False

Q5) Which of the following selections is not one of the features provided by a typical MDM?

A)Rapidly deploy new mobile devices

B)Discover devices accessing enterprise systems

C)Track stolen devices

D)Enforce encryption settings

Q6) The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds.

A)True

B)False

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Authentication and Account Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45976

Sample Questions

Q1) What type of authentication is based on what the user has?

A)software token

B)hardware token

C)security token

D)identity token

Q2) The use of what item below involves the creation of a large pre-generated data set of candidate digests?

A)rainbow tables

B)randomized character list

C)word list

D)cascade tables

Q3) What federated identity management (FIM)relies on token credentials?

A)OAuth

B)OpenID

C)Shibboleth

D)OpenPass

Q4) How does a retina scanner work?

Q5) Describe how rainbow tables work.

Q6) What smartcard standard is used to cover all U.S.government employees?

Q7) What is a dictionary attack?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Access Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45977

Sample Questions

Q1) Rule-Based Access Control can be changed by users.

A)True

B)False

Q2) Employee onboarding refers to the tasks associated with hiring a new employee.

A)True

B)False

Q3) Which of the following is a simpler subset of Directory Access Protocol?

A)SDAP

B)X.500 Lite

C)DIB

D)ADS

Q4) List three major access control models.

Q5) Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?

A)group-based access control

B)computer-based access control

C)role-based access control

D)system access control

Q6) Describe LDAP injection attacks.

Q7) Describe how Kerberos works.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Vulnerability Assessment and Data Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45978

Sample Questions

Q1) Realistically,risks can never be entirely eliminated.

A)True

B)False

Q2) What process does a penetration tester rely on to access an ever higher level of resources?

A)pivot

B)spinning

C)persistence

D)continuous exploitation

Q3) Which of the following is the goal of a vulnerability scan? (Choose all that apply. )

A)identify vulnerabilities

B)identify common misconfigurations

C)identify threat actors

D)identify a lack of security controls

Q4) What is the end result of a penetration test?

A)penetration test profile

B)penetration test report

C)penetration test system

D)penetration test view

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Business Continuity

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45979

Sample Questions

Q1) In what type of cluster does every server perform useful work so that if one fails,the remaining servers take on the additional load?

A)symmetric network

B)asymmetric network

C)symmetric server

D)asymmetric server

Q2) Which of the following is the sudden flow of electric current between two objects?

A)electromagnetic interference

B)Faraday interference

C)electrostatic discharge

D)electromagnetic pulse

Q3) An incident response plan is a set of written instructions for reacting to a security incident.

A)True

B)False

Q4) What is a hot site?

Q5) Why should redundant networks be implemented in many enterprise environments?

Q6) What are the steps in damage control?

Q7) What are the objectives of disaster exercises?

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Risk Mitigation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/45980

Sample Questions

Q1) What type of learner tends to sit in the middle of the class and learns best through lectures and discussions?

A)visual

B)auditory

C)kinesthetic

D)spatial

Q2) What is a security control?

Q3) Explain the concept of change management.

Q4) What is a risk register?

Q5) What kind of policy defines the actions users may perform while accessing systems and networking equipment?

A)VPN access policy

B)network use policy

C)privacy use policy

D)acceptable use policy

Q6) Which term below describes the art of helping an adult learn?

A)andragogical

B)pedagogical

C)deontological

D)metagogical

To view all questions and flashcards with answers, click on the resource link above. Page 17

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Computer Networking Security Pre-Test Questions - 750 Verified Questions by Quizplus - Issuu