landturn.com
  • Home
  • Blog
  • Reviews
  • NAACP
  • Tech
    • OS
    • Networking
    • Infosec
    • Sysadmin
    • OneTrust
  • Contact
  • Home
  • Blog
  • Reviews
  • NAACP
  • Tech
    • OS
    • Networking
    • Infosec
    • Sysadmin
    • OneTrust
  • Contact

Quiz
Cybersecurity
​

  1. True/False? Task Manager is one way to detect the malicious processes of a Root Kit on Windows computers.
  2. A Man-in-the-Middle Attack is an example of what kind of breach of the CIA Triad?
  3. Name at least eight common types of malware.
  4. What's the preferred secure configuration of AES?
  5. Parawise Transient Key = (PMK) + (__ Nonce) + (______ Nonce) + (__ ___ Address) + (______ ___ Address)
  6. True/False? It's not uncommon for DDoS attackers to assist Botnet attackers.
  7. In regard to AES, what are two advantages of working with modern CPUs from IBM?
  8. What three key lengths does AES support?
  9. What are the four most-frequent letters in the English language?
  10. What are the three kinds of DOS attacks?
  11. What are the four most-common written pairs referenced in #9.
  12. What are two security downsides to SSO?
  13. Despite a max encryption key of 2,048 bits, why is RC4 (Rivest Cipher 4) discouraged from use as a Stream Symmetric Cipher?
  14. What's the library commonly used in tools for packet capture and analysis like Wireshark?
  15. Which key among the five individual ones of the PTK encrypts broadcast or multicast traffic?
  16. True/False? The strength of an HMAC (Keyed-Hash MAC) depends on the key generated.
  17. True/False? The Galois/Counter Mode can't run parallel to AES?
  18. What's the file extension for an encrypted file?
  19. For a Dynamic ARP Inspection, what two things are matched in the DHCP Snooping table before discarding an ARP packet?
  20. True/False? For a Self-Signed Certificate, a client can sign a private key with a public key.
  21. What about the direction of network traffic differs between a firewall and a NID monitoring it?
  22. True/False? OAuth is an authentication system and OpenID is an authorization system?
  23. Typically, what port does OpenVPN use?
  24. How many bits of encryption -- thanks to the OpenSSL library -- does OpenVPN use?
  25. Name two kinds of offline or physical social-engineering tactics.
  26. What three ciphers are prone to Frequency Analysis of its plaintext?
  27. In the combined L2TP/IPSec standard, which protocol provides the tunneling and which provides the secure channel?
  28. What's the most secure authentication of a client by a server but requires much operational overhead?
  29. What's an alternative to VPNs?
  30. What makes it possible for the Elliptical Curve key to generate smaller, randomized values over RSA, DSA, and DH?
  31. MD5 is a Cryptographic Hashing Function that operates on blocks of ___ bits and generates a hash digest of ___ bits.
  32. True/False? The Diffie-Hellman (DH) algorithm for key exchange from each party = ([Public Key] X [Private Key]) + (Public Key) .
  33. What's the encryption strength of a Keyed-Hash Message Authentication Code (HMAC)?
  34. True/False? IDS will reconfigure firewall settings to block malicious network traffic.
  35. What physical factor of U2F (Universal 2nd Factor) prevents the introduction of malicious software?
  36. What can prevent the decoding of captured wireless network traffic that's encrypted?
  37. What's the term for two data inputs that produce the same digest or hash function?
  38. What steps must a Message Authorization Code (MAC) take to encrypt a message in CBC Mode?
  39. What's the best standard in wireless network security with less overhead and management compared to #32?
  40. True/False? Asymmetric Cryptography is known also as Private Key Cryptography.
  41. What mechanism in U2F (Universal Second Factor) prevents phishing attacks?
  42. What's the exponent for possible Salt values by systems like Linux, BSD, and Solaris that use 128-bit Salts?
  43. What's the standard for the format of digital certificates? 
  44. SHA1 is a Cryptographic Hashing Function that operates on blocks of ___ bits and generates a hash digest of ___ bits.
  45. What differs in how MACs, HMACs, CMACs, and CBC-MACs are generated?
  46. Name a popular piracy-susceptible software that's a major attack vector for malware?
  47. Name two implementations of LDAP.
  48. Rather than login credentials, what does an ID provider use to authenticate a user to an SSO provider?
  49. What's the standard that formats a Digital Certificate?
  50. What's the latest standard of the format in $43?
  51. What are three things does a Digital Certificate verify?
  52. True/False? In WPA2, the CCMP (Counter Mode CBC-MAC Protocol) cipher encrypts traffic prior to authentication. 
  53. What kind of secret key is burned into a TPM (Trusted Platform Module) at the manufactory?
  54. What's the desktop equivalent of a Secure Element in the hardware of mobile devices?
  55. What's the difference in function between a Message Integrity Check (MIC) and a MAC?
  56. What does the Caesar Cipher -- one of the best-known substitution ciphers -- use as its key?
  57. What's the mobile equivalent to the TPM (Trusted Platform Module)?
  58. In addition to cellular networking, what are two ways a mobile device can detect location?
  59. True/False? L2TP (Layer 2 Tunneling Protocol) provides encryption rather than encapsulation of tunneling protocols and traffic not supported by a VPN network.
  60. True/False? U2F protects against a Man-in-the-Middle Attack because its authentication occurs over an SSL connection.
  61. What kind of request does a server receive in a Ping Flood?
  62. Unlike WPA, what cipher is WPA2 based on -- in Counter Mode?
  63. What kind of Injection Attack targets a user? A Website?
  64. A Half-Open Attack is another name for what kind of DOS attack?
  65. What are three types of Injection Attacks?
  66. What kind of request does a client send in a SYN Flood?
  67. What's an XXS attack?
  68. How might a POD attack be related to a Backdoor Attack?
  69. With a self-signed certificate, the server used which key (public/private) to sign which key (public/private)?
  70. True/False? TACACS+ deals with AAA for networks and RADIUS for network devices.
  71. What makes DES (Data Encryption Standard) only 56 bits though it's technically 64 bits?
  72. What are the three kinds of Man-in-the-Middle Attacks?
  73. True/False? A user authenticates to a back-end RADIUS server via the Network Access Server (NAS).
  74. The PGP application uses keys no smaller than ___ bits?
  75. A Brute-Force Attack is an example of what kind of Password Attack?
  76. What's the latest recommended revision of TLS?
  77. True/False? To maintain its secure connection over an untrusted network, the SSH protocol limits the mechanisms for key exchange (i.e. Symmetric Encryption) or any desired client-side authentication.
  78. What's one of the most-secure encryption applications for email?
  79. True/False? An IV must be sent as plaintext in a data packet to enable decryption.
  80. What federal agency approved AES for Block Symmetric Encryption of top-secret info?
  81. True/False? You can revert to plaintext the digest of a Cryptographic Hash.
  82. What Hashing Function does TLS/SSL use?
  83. True/False? TLS sessions use Asymmetric Cryptography to encrypt the data.
  84. True/False? A cryptographic system is still secure if the Encryption Algorithm remains secret.
  85. True/False? An Initialization Vector injects random data into a Decryption Key.
  86. What does HTTP over TLS or SSL mean?
  87. True/False? In Kerberos, authorization occurs when the client sends a Client-to-Server ticket to the SS.
  88. What's the difference between OTP and Universal 2nd Factor?
  89. At present, what authentication protocol does Windows use?
  90. What's the best standard in wireless network security, but requires lots of overhead and management?
  91. How few times might the same encryption key be used before a cipher can be broken to recover plaintext?
  92. How are Stegography and Cryptography different?
  93. True/False? A CMAC requires asymmetric cipher encryption and a public key to generate the Message Access Control. 
  94. What encryption key lengths (2) does WEP support?
  95. What kind of Injection Attack might accompany session-hopping in a Man-in-the-Middle Attack?
  96. Ciphertext has two components: the Key and the __________ _________ . 
  97. Why don't multiple passwords provide extra security in Multi-Factor Authentication?

Related: Cybersecurity 2 (Notes)
Related: Cybersecurity 3 (Notes)
Related: Encryption Algorithm (2021)
Related: Computer Networking (Quiz)
​Related: "Cybersecurity and Cyberwar" (2020)

Buy me a coffee
© 2019 - 2022 | landturn.com | Jubalyn ExWilliams