Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

quiz-placeholder

Similar activities

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

Quiz Informatica Jornadas Orientación Asunción

Quiz Informatica Jornadas Orientación Asunción

12th Grade - University

10 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Argumentación

Argumentación

University

15 Qs

Internet

Internet

University

11 Qs

Algo Quiz

Algo Quiz

University

16 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Joan Lim

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which method tries all possible passwords until a match is found?

brute force

rainbow tables

dictionary

birth date

Answer explanation

Two common methods of cracking hashes are dictionary and brute force. Given time, the brute force method will always crack a password.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the standard for a public key infrastructure to manage digital certificates?

x.509

x.503

PKI

NIST-SP800

Answer explanation

The x.509 standard is for a PKI infrastructure and x.500 if for directory structures.​

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a strength of using a hashing function?

It is a one-way function and not reversible.

It can take only a fixed length message.

Two different files can be created that have the same output.

It has a variable length output.

Answer explanation

Understanding the properties of a hash function shows its applicability such as one-way function, arbitrary input length, and fixed output.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice and Bob use the same codeword to login into a website. This means both would have the exact same hash for their codewords. What could be implemented to prevent both codeword hashes from being the same?

peppering

RSA

salting

pseudo-random generator

Answer explanation

A password is stored as a combination of both a hash and a salt.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A company is concerned with malicious traffic from malware that flows through the network. What technology can be put in place to detect potential malware traffic on the network?

IPS

IDS

Firewall

NAC

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Why should WEP not be used in wireless networks today?

easily cracked

its age

its lack of encryption

its use of clear text passwords

Answer explanation

Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?

OS

syslog

Windows

audit

Answer explanation

Audit logs can track user authentication attempts on workstations and can reveal if any attempts at break-in were made.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?