Sample questions
Q1. Media Access Control (MAC) is a:
- Addressing scheme
- Internet protocol
- Hardware model
- Network Interface card address
Q2. A protocol is a:
- Data Encryption Standard
- Layered architecture
- Communication standard
- Data link
Q3. Spoofing is a type of:
- Vulnerability
- Masquerading
- Protocol
- Layer in a TCP/IP model
Q4. The purpose of using Secure Shell (SSH) over TELNET is:
- SSH provides shell access to the target system
- SSH is faster than Telnet
- SSH encrypts the session and Telnet does not encrypt the session
- SSH is less expensive than Telnet
Q5. An attack is a:
- Threat
- Vulnerability
- Technique
- Protocol
Q6. Transport Layer Security and Secure Sockets Layer are not:
- Protocols
- Use cryptographic algorithms
- Vulnerability Use encryption
Q7. Replay attacks are used to:
- Gain unauthorized access to the application systems
- Resolve domain names
- Break cryptographic keys
- Setup secure connections