Web
Analytics

It Support
Internet Security Fundamentals Test
Answer 25 questions in 10 minutes.

Internet Security Fundamentals Test |


Who was TLS defined by?
Internet layers
The DEA
NSA
OSHA
Internet Engineering Task Force

When cookies are used as session identifiers - how are they then used as a potential security hazard?
They emulate user's by stealing their personal identity.
Attackers emulate users by stealing their cookies.
User's cookies are altered to a virus-like state.
SSL layer
They emulate user's by downloading all the victims information onto a virtual machine.

Which of the following type of attack can actively modify communications or data?
Neither Active nor Passive attack
Active attack
Both Active and Passive attack
Passive attack
Secure cookies are passed along via encrypted programs.

What is a firewall?
Illegitimate use
Firewalls are interrupts that automatically disconnect from the internet when a threat appears.
A firewall is a program that encrypts all the programs that access the Internet.
Firewalls are network-based security measures that control the flow of incoming and outgoing traffic.
A firewall is a program that keeps other programs from using the network.

Which of the following is a VALID authorization key?
Asymmetric authorization keys
Public ephemeral key authorization key
Symmetric authorization keys
DOM-based and persistent
Public authorization key

Which of the following is a VALID type of Key Management System?
Integrated Key Management System
Third-Party Key Management System
Malware
Dynamic Key Management System
Both Integrated Key Management System and Third-Party Key Management System

Trojan Horse programs operate with what intent?
X.508
To masquerade as non-malicious software while exploiting a system's weaknesses.
To slowly but surely infect and become your operating system until the system crashes.
To openly exploit a systems weaknesses until the user discovers it.
To do a series of brute force attacks within the system itself and a series of external attacks from other servers.

What does the Linux kernal use to sandbox running programs?
Black-listing access to TCP services on critical systems.
Linux drives are fully encrypted - thus they don't need sandboxing.
Linux doesn't sandbox because it is impervious to any and all cyber attacks.
Linux uses a layered system of user authentication to perform sandbox-like functions.
seccomp - or Secure Computing Mode

Which of the following is a valid Internet Security requirement?
Integrity
Authentication
Ways to disconnect your router in an emergency.
Confidentiality
All of the given options are correct

Which of the following is a valid flaw of SSL 2.0 ?
Identical cryptographic keys are used for message authentication and encryption
It has a weak MAC construction that uses the MD5 hash function with a secret prefix
SSL layer
It does not have any protection for the handshake
All of the given options are correct

Which version of TLS is vulnerable to BEAST exploit?
Large-scale sequel databases such as those containing credit card information.
TLS 1.1
TLS 2.0
TLS 0.5
TLS 3.0

Which of the following keys are used to generate random numbers?
Symmetric random number generation keys
Public signature verification key
Asymmetric random number generation keys
Symmetric and asymmetric random number generation keys
When it is in transit.

What does cross-site scripting allow for attackers?
A phishing attack that automatically downloads the victims personal information.
The introduction of worm viruses into the victims website.
Direct introduction of viruses into a victims computer.
Injection of client-side scripts into web pages.
Technical Control Panel

Which of the following uses asymmetric cryptography ?
(none of these)
SSL
VoIP
Both VoIP and SSL
Symmetric signature authentication key

Is true that HTTP is an insecure protocol?
False
Private signature key
True
Public authentication key
Public signature verification key

Which of the following is a VALID ephemeral key?
Asymmetric ephemeral random number generation keys
Public ephemeral verification key
It is the specialized dataset that is able to decrypt cyphertext.
Symmetric ephemeral random number generation keys
Public ephemeral key agreement key

Which of the following are valid Cryptographic key types?
Public authentication key
Key wrapping keys
Public signature verification key
Private signature key
All of the given options are correct

Why is a virtual machine considered a sandboxing method?
Virtual machines take the brunt of the attack - so the user is always safe.
To do a series of brute force attacks within the system itself and a series of external attacks from other servers.
All host resources are channeled through the emulator.
Virtual machines all have firewalls - virus scanners - and proxy connetions.
Virtual machines all have sandbox features installed on them.

What is a computer virus?
Malicious software that inserts itself into other programs.
A virus is friendly software that is simply mislabled.
Intellectual Property
Malicious software that merely stays dormant on your computer.
A virus is the same as a cookie in that it is stored on your computer against your permission.

There are two types of firewall. What are they?
Remote and local
Identical cryptographic keys are used for message authentication and encryption
Digital and electronic.
Internet-based and home-based.
Hardware and software.

Which of the following symmetric keys can be derived from Symmetric master key?
Authentication keys
All of the given options are correct
Masquerading
Data encryption keys
Key wrapping keys

Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
Masquerading
Backdoor
Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
Trojan Horse
Phishing

What are the two primary classifications of cross-site scripting?
traditional and DOM-based
Firewalls
non-persistent and persistent.
traditional and non-persistent
DOM-based and persistent

Which of the following is a VALID digital signature key?
Private signature key
Symmetric authorization keys
Private signature authentication key
Public signature authentication key
Symmetric signature authentication key

GET PROVEN ADVICE FROM
100+ BEST BOOKS IN 1 BOOK

250 Top Work & Personal Skills Made Easy

The World's First & Only Encyclopedia of
Self Help, Self Improvement & Career Advice

250+ Easy-to-Follow Guides
5000+ Proven Tips
13 Types of Essential Skills

502 Pages | $3.99 | PDF / EPub, Kindle Ready



 
 
 




Please report any error in fatskills quizzes and questions to 'simpleversity at gmail.com'.

Without work one finishes nothing. - Ralph Waldo Emerson

© The Simple Project 2020