NVST TEST 5

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following is FALSE about User Datagram Protocol (UDP)?
2.
1 point
Each machine with a TCP/IP stack has ______ TCP ports and ______ UDP ports.
3.
1 point
Which of the following is an advantage of using virtual machines?
4.
1 point
Which of the following statements is FALSE about the key terms used in the risk management process?
5.
1 point
Each of the following is intended to protect information except __________.
6.
1 point
A port scanner has reported that your web server running with a supporting SQL database is listening on TCP ports 80, 443, 21, and 1433. Which of these ports is unnecessary and should be closed to prevent hacking attempts?
7.
1 point
Which of the following is not a feature or capability of a port scanner?
8.
1 point
IP resides at which layer of the OSI model?
9.
1 point
*An attacker with low skill level is called?
10.
1 point
An attacker normally takes inventory of which type of ports on the system?
11.
1 point
Attacker can ask the server to send all information it has about a given domain through requesting a ________ from the name server.
12.
1 point
*Each of the following protocols can be used to encrypt transmissions over the Internet except _________.
13.
1 point
The following are useful data elements from the Registrar of Whois Search except _______.
14.
1 point
A host has an IP address of 128.78.3.2. The network is subnetted by borrowing the first 3 bits of host address bits. What is the subnet mask for 128.78.3.2?
15.
1 point
*The following are commonly used techniques for reconnaissance except ________.
16.
1 point
_______ is the interception of network data not intended for the machine that is intercepting the traffic.
17.
1 point
A person wishing to prevent users from accessing a web server and the information on it would try a ____ attack.
18.
1 point
The qualities and characteristics of the network traffic generated by Nmap's ping scan are called its _________.

19.
1 point
*What does an attacker do in Reconnaissance Phase?
i. An attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack
ii. The core of Reconnaissance attack is intrusive information gathering techniques
iii. System is breached or accessed in order to retrieve information
20.
1 point
Which of the following IP address class is reserved for future use?
21.
1 point
*What is the name of the unique physical address that is assigned to every network interface card?
22.
1 point
*Which of the following is not a well known TCP port number?
23.
1 point
Attackers known as ____________ like to think of themselves as an elite group who are performing a valuable service in identifying security weaknesses.
24.
1 point
A(n) __________ is a weakness that allows a threat agent to bypass security.
25.
1 point
You connected your company to the Internet, and security is a concern. What should you install?