Security+ Chapter 3
Start
Congratulations - you have completed Security+ Chapter 3.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
What has been employed as a common defense against hostile Java applets?
A | Cookies |
B | Tokens |
C | Sandboxes |
D | Mirroring |
Question 2 |
What type of attack depends on a hacker's ability to enter a database query into a dynamic web page?
A | Buffer overflow |
B | Logic bomb |
C | SQL injection |
D | Cross site scripting |
Question 3 |
What will often run on your computer as software to supplement your antivirus to prevent malicious packets from entering or leaving your computer?
A | Personal antispam |
B | Network intrusion detection system |
C | Network firewall |
D | Personal software firewall |
Question 4 |
_______ software, which usually uses signature or definition files, can scan a computer for infections and look for suspicious activity.
A | Bot net |
B | Antispam |
C | Antivirus |
D | Pop-up blocker |
Question 5 |
Which of the following options is not one of the patch management techniques available to you
A | Check for updates but let me choose whether to download and install them |
B | Always check for updates |
C | Download upates but let me choose whether to install them |
D | Install updates automatically |
Question 6 |
A recommended way to harden your operating system is to
A | Turn off all services |
B | Stay on Windows XP because newer operating systems cannot be hardened |
C | Properly manage updates |
D | Install a buffer-overflow avoidance program |
Question 7 |
What is a general software security update intended to cover vulnerabilities that have been discovered
A | Security patch |
B | Ultimate download |
C | Service pack |
D | Hotfix |
Question 8 |
Windows based defensive code built to defend against ________ are DEP and ASLR.
A | SQL injection |
B | Viruses |
C | Buffer Overflow |
D | Trojan horses |
Question 9 |
Files used by your web browser that can contain user-specific information are
A | Cookies |
B | Trojan horses |
C | Security Policies |
D | Token rings |
Question 10 |
What type of browser attack takes advantage of webpages that redisplay, or echo, user input that has not been properly validated?
A | Cross Site Scripting (XSS) |
B | Java appleting |
C | Cookie exploitation |
D | Buffer overflows |
Question 11 |
What can spammers take advantage of in order to send out large volumes of junk mail?
A | SNMP pass-thru |
B | SMTP open relays |
C | Cross site scripting |
D | SQL injections |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 11 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!