NSTT Quizzes

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What are some disadvantages of a symmetric cryptosystem? (choose 2)
2.
1 point
Hash Functions:
3.
1 point
Which protocols comprise SSL? (choose 3)
4.
1 point
The IPSec Authentication Header(AH):
5.
1 point
Fa0/0 of a router is connected to the ISP. With the following reflexive ACLs:
ip access-list extended ReflectACL
permit ip any any reflect ReflectList
deny ip any any
ip access-list extended EvaluateACL
evaluate ReflectList
deny ip any any

What command will finish the placement on Fa0/0?
6.
1 point
A major AT&T communication station in San Francisco was:
7.
1 point
What can you do to reduce the risk of DoS attacks? (choose 3)
8.
1 point
Applications that require strong host authentication such as cryptographic do this at what layer?
9.
1 point
What are some advantages of an asymmetric cryptosystem? (choose 3)
10.
1 point
The Spy Factory was a PBS presentation by:
11.
1 point
What is the biggest data leakage challenge for organizations?
12.
1 point
Block Ciphers:
13.
1 point
Osama Bin Laden's satellite phone transmissions were encrypted.
14.
1 point
Protecting or shielding one app from another is knows as
____________?
15.
1 point
Fa0/0 of a router is connected to the ISP. With the following reflexive ACLs:
ip access-list extended ReflectACL
permit ip any any reflect ReflectList
deny ip any any
ip access-list extended EvaluateACL
evaluate ReflectList
deny ip any any

Fa0/0 of a router is connected to the ISP. Normally, the CBACs inspect should be placed on this interface.
16.
1 point
- A ____ is a threat that appears to be a legitimate application but comes with an associated security risk / Is a risk that comes with the use of an application, even if the application can be used for legitimate purposes. (i.e. facebook or other messengers to help group collaboration.)

- Converting a known threat into an unknown threat (steve's addition to my quiz)
17.
1 point
Fa0/0 of a router is connected to the ISP. With the following reflexive ACLs:
ip access-list extended ReflectACL
permit ip any any reflect ReflectList
deny ip any any
ip access-list extended EvaluateACL
evaluate ReflectList
deny ip any any

What information is placed in the ReflectList ACL?
18.
1 point
Where does most mobile malware stem from?
19.
1 point
What are the main components of computer security? (choose 3)
20.
1 point
Select a couple challenges facing organizations concerning security on mobile devices. (Choose 2)
21.
1 point
What is not true about Site-to-Site VPNs?
22.
1 point
What are some disadvantages of an asymmetric cryptosystem? (choose 2)
23.
1 point
What are some advantages of a symmetric cryptosystem? (choose 2)
24.
1 point
The Foreign Intelligence Surveillance Act is by passed by:
25.
1 point
Fa0/0 of a router is connected to the ISP. With the following reflexive ACLs:
ip access-list extended ReflectACL
permit ip any any reflect ReflectList
deny ip any any
ip access-list extended EvaluateACL
evaluate ReflectList
deny ip any any

What command will correctly place the reflexive on Fa0/0?
26.
1 point
The Foreign Intelligence Surveillance Act allows monitoring of:
27.
1 point
A port-based (legacy) firewall filters traffic based on static ACLs that focus on _____
28.
1 point
What are some methods applications use to circumvent traditional firewalls? (choose 4)
29.
1 point
Symmetric encryption:
30.
1 point
Fa0/0 of a router is connected to the ISP. With the following reflexive ACLs:
ip access-list extended ReflectACL
permit ip any any reflect ReflectList
deny ip any any
ip access-list extended EvaluateACL
evaluate ReflectList
deny ip any any

Which statement is true about CBACs?