Sample questions

Q1. Media Access Control (MAC) is a:

  1. Addressing scheme
  2. Internet protocol
  3. Hardware model
  4. Network Interface card address

Q2. A protocol is a:

  1. Data Encryption Standard
  2. Layered architecture
  3. Communication standard
  4. Data link

Q3. Spoofing is a type of:

  1. Vulnerability
  2. Masquerading
  3. Protocol
  4. Layer in a TCP/IP model

Q4. The purpose of using Secure Shell (SSH) over TELNET is:

  1. SSH provides shell access to the target system
  2. SSH is faster than Telnet
  3. SSH encrypts the session and Telnet does not encrypt the session
  4. SSH is less expensive than Telnet

Q5. An attack is a:

  1. Threat
  2. Vulnerability
  3. Technique
  4. Protocol

Q6. Transport Layer Security and Secure Sockets Layer are not:

  1. Protocols
  2. Use cryptographic algorithms
  3. Vulnerability Use encryption

Q7. Replay attacks are used to:

  1. Gain unauthorized access to the application systems
  2. Resolve domain names
  3. Break cryptographic keys
  4. Setup secure connections
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.59.219