0

Network Security

Description: Network Security
Number of Questions: 29
Created by:
Tags: networking
Attempted 0/16 Correct 0 Score 0

Provides authentication from networking device to RADIUS server

  1. 802.1x

  2. CHAP

  3. EAP

  4. Kerberos


Correct Option: A

Allows a user to authenticate once and get authentication to all servers, uses ticketing system

  1. EAP

  2. Kerberos

  3. SSO

  4. 802.1x


Correct Option: B

Assists in communication of the device ID to RADIUS server

  1. Kerberos

  2. EAP

  3. 802.1x

  4.  CHAP


Correct Option: B

All devices have a shared secret password, 3-way handshake

  1. Kerberos

  2. SSO

  3. EAP

  4. CHAP


Correct Option: D

Gives you authentication to multiple systems with a single password

  1. EAP

  2. Kerberos

  3. SSO

  4. 802.1x


Correct Option: C

Which type of virus uses a keylogger?

  1. Crimeware

  2. Adware

  3. Trojan horse

  4. Rootkit


Correct Option: A

Which type of virus uses a tracking cookie?

  1. Crimeware

  2. Logic bomb

  3. Spyware

  4. Adware


Correct Option: C

Which type of virus is almost invisible to anti-malware?

  1. Spyware

  2. Rootkit

  3. Logic bomb

  4. Trojan horse


Correct Option: B

Which kind of virus can possibly make your computer become a zombie?

  1. Rootkit

  2. Worm

  3. Logic bomb

  4. Trojan horse


Correct Option: D

Ties up the network bandwith

  1. Stealth

  2. Trojan horse

  3. Worm

  4. Rootkit


Correct Option: C

What type of virus can change its form to avoid detection?

  1. Polymorphic

  2. Companion

  3. Macro

  4. Worm


Correct Option: A

Which kind of social engineering hack occurs over VoIP?

  1. Whaling

  2. Phishing

  3. Vishing

  4. Valing


Correct Option: C

What does the "r" in RFID stand for?

  1. Radio

  2. Rootkit

  3. Regular

  4. Reflective


Correct Option: A

Which is not a prevention method against Access Security?

  1. Turnstiles

  2. Keycode locks

  3. Mantraps

  4. Apply list


Correct Option: D

Which of these is not a layer of defense?

  1. Access

  2. Perimeter

  3. Network

  4. Inter-facility


Correct Option: C

Which is not one of the three factors to keep in mind when it comes to physical security?

  1. Prevention

  2. Intervention

  3. Detection

  4. Recovery


Correct Option: B
- Hide questions