Security+ Chapter 4
Start
Congratulations - you have completed Security+ Chapter 4.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
Which statement is true regarding back doors?
A | Written in by hackers, and can't be used by programmers |
B | Written in by software programmers, but can't be used by hackers |
C | Should be patched/closed immediately |
D | Another name for the administrator account on your computer or network device |
Question 2 |
If you type www.usmc.mil into your web browser, where is the first place your computer is going to look to find what the IP address of that server is?
A | Primary DHCP server |
B | Hosts file |
C | DNS root server |
D | Primary DNS server |
Question 3 |
Which of the following attacks would not be considered a Denial of Service (DOS)?
A | Smurf |
B | SYN flood |
C | DNS poisoning |
D | Fraggle rock |
Question 4 |
If you installed a network tap (physical) or a port mirror (logical) what would you use it for?
A | To trap attackers |
B | To send a copy of my traffic to a protocol analyzer |
C | To cluster my server farm |
D | To send my e-mail traffic to a mail server |
Question 5 |
What is a best practice relating to user accounts?
A | Never change the account that came with the device or software in case you lose your log in information |
B | Always log on as an administrator |
C | Change or disable the default account |
D | Always use easily guessable usernames and passwords so you do not have to write them down |
Question 6 |
What describes a rogue access point?
A | An access point that is running WEP |
B | An unauthorized access point that is placed on the network |
C | An authorized access point that is placed on the network |
D | An access point that has dropped its config |
Question 7 |
Wireshark is a protocol analyzer, which is used to monitor traffic. What is another name for a protocol analyzer?
A | Port mirror |
B | Logic bomb |
C | Intrusion detection system |
D | Packet sniffer |
Question 8 |
A replay attack is an attack where information is captured by an attacker and used at a later time to authenticate as the original host. What is usually used as a defense against these attacks?
A | Packet sniffers |
B | Protocol analyzers |
C | Private keys |
D | Timestamps |
Question 9 |
What are not some areas to be on the lookout for attackers to exploit network media?
A | Fire alarms |
B | Unprotected RJ-45 jacks |
C | False ceilings |
D | Exposed wiring |
Question 10 |
What is the term for pretending to be someone else by presenting false information?
A | Spoofing |
B | Hacking |
C | Digital impersonation |
D | Freaking |
Question 11 |
Driving a vehicle around and looking for wireless access points is called
A | Association |
B | War dialing |
C | Beaconing |
D | War driving |
Question 12 |
SNMP is a management protocol that is widely known to have some security issues. What the the recommended version to use?
A | Version 2 |
B | Version 3 |
C | Version 1 |
D | Version 4 |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 12 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!