in LEARNING
Exam questions
Question 1 of 16
Protecting data from unauthorized modification is called:
Integrity
Confidentiality
Availability
Authentication
Question 2 of 16
Asymmetric encryption, also called encryption uses two keys, a public key and a private ke
publickey
conventional
symmetric
keyed
Question 3 of 16
Question 3 of 16
What can be embedded within an email to run malicious code when the user opens the email?
keys
streams
malware
bots
Question 4 of 16
A secure connection will be identified as HTTPS, which means any information that is sent between you and the web:
encrypted
uses ActiveX
contains an XML file
is a location service
Question 5 of 16
The two main types of encryption algorithms are symmetric and
asymmetric
XSS
binding
broadcast
Question 6 of 16
Unlike encryption, a function is one-way. It takes a variable length input and produces a fixed length o
block
stream
hash
keyed
uestinn 7 of 16
Question 7 of 16
encryption uses encryption to protect data on entire drives or logical volumes.
Binding
BitLocker Drive
Public Key
Stream
2urston B of 16
What do you call a colection of programs that can infiltrate a computer system, create a backdoor and rer
hacker to take administrator level control of the victim's
computer?
buffer overflow
honeynet
rootkit
RADIUS exploit
Question 9 of 16
On a wireless network use to ensure that only authorized client computers are able to access the wirelesUnetwo
MAC address filtering
sSID tuning
BSSID Broadcast
WEP conversion
ttTOn TU OT To
What tracks information on a user's viewing habits while on the internet, and then sends that information to a remot
the user's knowledge?
spyware
buffer overflow
RADIUS exploit
worm
Question 11 of 16
Question 11 of 16
The WiFi is a fake access point that is set up as an
open network as a trap to get you to join, with the &bjective of ste
credentials and other information.
brownie
X cookie
nugget
pineapple
Question 12 of 16
V
One of the ways to protect wireless traffic from prying eyes is by using a key, where all entities share the same key,s
password or pass phrase to secure the traffic between entities.
location
pre-shared
zone
third-party
Question 13 of 16
To prevent a WAP from appearing in the list of available wireless networks you should disable broadcast1ng the
WPA
BSSID
SSID
WEP Key
Question 14 of 16
A
A has the ability to spread through the network without any help froma transport agent.
worm
buffer overflow
Virus
RADIUS exploit
Question 15 of 16
A secure browser actively blocks trackers and C o o k i e s so that your browsinGis kept private
palm print
certificate
Zone
third-party
Question 16 of 16
What is something that might happen, is generally difficult to control, and
natural disasters?
can range from innocent mistakes
asset
threat
honeypot
spyware