Sample questions
Q1. Media Access Control (MAC) is a:
Addressing scheme
Internet protocol
Hardware model
Network Interface card address
Q2. A protocol is a:
Data Encryption Standard
Layered architecture
Communication standard
Data link
Q3. Spoofing is a type of:
Vulnerability
Masquerading
Protocol
Layer in a TCP/IP model
Q4. The purpose of using Secure Shell (SSH) over TELNET is:
SSH provides shell access to the target system
SSH is faster than Telnet
SSH encrypts the session and Telnet does not encrypt the session
SSH is less expensive than Telnet
Q5. An attack is a:
Threat
Vulnerability
Technique
Protocol
Q6. Transport Layer Security and Secure Sockets Layer are not:
Protocols
Use cryptographic algorithms
Vulnerability Use encryption
Q7. Replay attacks are used to:
Gain unauthorized access to the application systems
Resolve domain names
Break cryptographic keys
Setup secure connections