Security+ Chapter 4
Start
Congratulations - you have completed Security+ Chapter 4.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
Driving a vehicle around and looking for wireless access points is called
A | Association |
B | War dialing |
C | War driving |
D | Beaconing |
Question 2 |
What describes a rogue access point?
A | An access point that is running WEP |
B | An access point that has dropped its config |
C | An unauthorized access point that is placed on the network |
D | An authorized access point that is placed on the network |
Question 3 |
If you type www.usmc.mil into your web browser, where is the first place your computer is going to look to find what the IP address of that server is?
A | Hosts file |
B | Primary DHCP server |
C | DNS root server |
D | Primary DNS server |
Question 4 |
Which of the following attacks would not be considered a Denial of Service (DOS)?
A | Fraggle rock |
B | SYN flood |
C | DNS poisoning |
D | Smurf |
Question 5 |
If you installed a network tap (physical) or a port mirror (logical) what would you use it for?
A | To trap attackers |
B | To send a copy of my traffic to a protocol analyzer |
C | To cluster my server farm |
D | To send my e-mail traffic to a mail server |
Question 6 |
Wireshark is a protocol analyzer, which is used to monitor traffic. What is another name for a protocol analyzer?
A | Packet sniffer |
B | Port mirror |
C | Intrusion detection system |
D | Logic bomb |
Question 7 |
What is the term for pretending to be someone else by presenting false information?
A | Digital impersonation |
B | Hacking |
C | Freaking |
D | Spoofing |
Question 8 |
A replay attack is an attack where information is captured by an attacker and used at a later time to authenticate as the original host. What is usually used as a defense against these attacks?
A | Packet sniffers |
B | Private keys |
C | Protocol analyzers |
D | Timestamps |
Question 9 |
What is a best practice relating to user accounts?
A | Change or disable the default account |
B | Never change the account that came with the device or software in case you lose your log in information |
C | Always use easily guessable usernames and passwords so you do not have to write them down |
D | Always log on as an administrator |
Question 10 |
Which statement is true regarding back doors?
A | Written in by hackers, and can't be used by programmers |
B | Another name for the administrator account on your computer or network device |
C | Should be patched/closed immediately |
D | Written in by software programmers, but can't be used by hackers |
Question 11 |
SNMP is a management protocol that is widely known to have some security issues. What the the recommended version to use?
A | Version 3 |
B | Version 4 |
C | Version 2 |
D | Version 1 |
Question 12 |
What are not some areas to be on the lookout for attackers to exploit network media?
A | False ceilings |
B | Unprotected RJ-45 jacks |
C | Exposed wiring |
D | Fire alarms |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 12 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!