Sie sind auf Seite 1von 5

IT Security Basic Test

1. A software or hardware that checks information coming from the Internet and depending on
the applied configuration settings either blocks it or allows it to pass through is called:
a. Antivirus
b. Firewall
c. Antispyware
d. Malware

2. A device designed to forward data packets between networks is called:


a. Switch
b. Hub
c. Router
d. MAC filter

3. Allowing a program through a firewall is known as creating:


a. Tunnel
b. Entry
c. Access Point (AP)
d. Exception

4. A network device designed for managing the optimal distribution of workloads across
multiple computing resources is called:
a. Load balancer
b. HIDS
c. Firewall
d. Captive portal

5. The last default rule on a firewall is to:


a. Create an exception
b. Allow all traffic
c. Deny all traffic
d. Unblock all ports

6. A computer network service that allows clients to make indirect network connections to
other network services is called:
a. Load balancer
b. Proxy
c. Network Access Control (NAC)
d. Backdoor

7. A solution designed for filtering malicious / restricted content from entering corporate
networks is known as:
a. MAC filter
b. Subnetting
c. HIPS
d. Web security gateway
IT Security Basic Test
8. One of the measures for securing networking devices includes the practice of disabling
unused ports.
a. True
b. False

9. What type of protocols ensure the privacy of a VPN connection?


a. OSPF
b. IPv6
c. Tunneling
d. Telnet

10. Which of the following answers refers to a dedicated device for managing secure
connections established over an untrusted network, such as the Internet?
a. Load balancer
b. VPN concentrator
c. Spam filter
d. Web server

11. Which of the following acronyms refers to a network or host based monitoring system
designed to automatically alert administrators of known or suspected unauthorized activity?
a. IDS
b. AES
c. TPM
d. EFS

12. A software tool used to monitor and examine contents of network traffic is known as: (Select
all that apply)
a. Port scanner
b. Packet sniffer
c. Vulnerability scanner
d. Protocol analyzer

13. Which of the following answers list the protocol and port number used by a spam filter?
(Select 2 answers)
a. HTTPS
b. 23
c. SMTP
d. 443
e. TELNET
f. 25

14. Which of the following acronyms refers to a network security solution combining the
functionality of a firewall with additional safeguards such as URL filtering, content
inspection, or malware inspection?
a. MTU
b. STP
c. UTM
d. XML
IT Security Basic Test
15. URL filtering restricts access to Internet sites based on which of the following criteria?
a. Virus signature
b. Web address
c. Baseline
d. Data content

16. Which of the following network security solutions inspects network traffic in real-time and
has the capability to stop the ongoing attack?
a. NIPS
b. HIDS
c. HIPS
d. NIST

17. Which of the following acronyms refers to a firewall controlling access to a web server?
a. WPS
b. WEP
c. MTBF
d. WAF

18. Which of the following answers refers to a set of rules that specify which users or system
processes are granted access to objects as well as what operations are allowed on a given
object?
a. CRL
b. NAT
c. BCP
d. ACL

19. Which of the following actions can be taken by passive IDS? (Select 2 answers)
Reconfiguring firewall
a. Closing down connection
b. Logging
c. Terminating process
d. Sending an alert

20. 802.1x is an IEEE standard defining:


a. Token ring networks
b. Port-based network access control
c. VLAN tagging
d. Wireless networking

21. An access control model in which access to resources is granted or denied depending on
Access Control List (ACL) entries is also known as:
a. Mandatory Access Control
b. Lattice-Based Access Control
c. Role-Based Access Control
d. Rule-Based Access Control
IT Security Basic Test
22. Which type of Intrusion Detection System (IDS) relies on the previously established baseline
of normal network activity in order to detect intrusions?
a. Signature-based
b. URL filter
c. Anomaly-based
d. ACL

23. Which of the following security solutions provides a countermeasure against denial-of-
service attack characterized by increasing number of half-open connections?
a. Flood guard
b. MAC filter
c. Port scanner
d. Honeypot

24. Which of the following protocols protects against switching loops?


a. UTP
b. SSH
c. STP
d. HMAC

25. Which type of Intrusion Detection System (IDS) relies on known attack patterns to detect an
intrusion?
a. Load balancer
b. Signature-based
c. Protocol analyzer
d. Anomaly-based
IT Security Basic Test
Scenario 1:

You receive the following email from the Help Desk:

Dear yahoo email user,


Beginning next week, we will be deleting all inactive email accounts in order to create space for
more users. You are required to send the following information in order to continue using your email
account. If we do not receive this information from you by the end of the week, your email account
will be closed.

*Name (first and last):


*Email Login:
*Password:
*Date of birth:
*Alternate email:

Please contact the Webmail Team with any questions. Thank you for your immediate attention.

What should you do?

Scenario 2:

The mouse on your computer screen starts to move around on its own and click on things on your
desktop. What do you do?

A: Call your co-workers over so they can see.


B: Disconnect your computer from the network.
C: Unplug your mouse.
D: Tell your supervisor.
E: Turn your computer off.
F: Run anti-virus.
G: All of the above.

Das könnte Ihnen auch gefallen