Quiz set B Flashcards

(30 cards)

1
Q

Security focuses on
- Speed
- Safety
- Graphic

A

Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of Cybersecurity
- Delete files
- Protect information

A

Protect information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the most at risk online
- Banks
- GOvernmnet
- All network users

A

All network user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall functions
- Install software
- FIlter traffic
- Print data
- play videos

A

Filter traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS helps to
- Monitor threats
- Delete OS

A

Monitor threatsD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dos attacks means
- Faster system
- Server overload
- FIle encryption

A

Server overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SYN flooding affects
- TCP
- Keyboard
- Mouse

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMURF attack uses
- email
- broadcast ping

A

broadcast ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS uses
- One computer
- Many computer
- Router
- Printer

A

Many Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet sniffing is
- Traffic monitoring
- File Deletion
- Email Sending

A

Traffic monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public Wi-Fi risk
- Slow internet
- Data interception
- Broken cble
- Virus only

A

Data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure remote access protocol
- HTTP
- SSH
- FTP
- SMTP

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure browsing uses
- HTTP
- HTTPS
- FTP
- Telnet

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP hijacking involves
- Taking over connection
- Breaking hardware
- Deleting RAM
- Stopping monitor

A

Taking over connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionay attack is
- Guess password
- Print words
- Delete files

A

Guess password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA Triad includes
- Security Layr
- Confidentiality
- System
- Internet authority

A

Confidentiality

17
Q

Confidentiality ensures:
- Restricted access
- Open Access
- Data deletion
- Sharing

A

Restricted access

18
Q

Integrity ensures:
-Accurate data
- Fast system
- large storage

A

Accurate data

19
Q

Availability ensures:
- Systemuptime
- Shutdown
- Formatting

A

System uptime

20
Q

Authentication is:
- Identity verification
- Access control

A

Identity verification

21
Q

Authorization is:
-permission granting
- identity check

A

Permission granting

22
Q

MFA require:
- One factor
- Multiple factors
- No login

A

Multiple factors

23
Q

Security patch:
- Fixes bugs
- Addds games
- Deletes OS
- Increases storage

24
Q

Content Security Policy prevents:
- XSS attacks
- Printer issues
- Keyboard issues

25
Least privelege means - Minimum access - Full acccess - No access - guest acces
Minimum access
26
T or F IDS monitors suspicious activities
True
27
T or F DoS makes services unavailable
Truw
28
T or F Packet sniffing can capture passwords
True
29
T or F SSH is more secure than Telnet
True
30
T or F Defense in depth uses one layer only
False