1 Modern security systems

1.1 Modern security systems

1. The number of security incidents

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

2. Network security

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

3. A network security system

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

4. Which of the following is not a security service

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

5. Which of the following is not a security mechanism

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

6. Regarding attack classifications

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

7. The security threats

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

8. Regarding malicious software

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

9. Spyware

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

10. zero-day attacks

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

11. Scanners refers to

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

12. Denial of service attacks

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

13. Distributed DoS attacks

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

14. Social engineering attacks

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

15. What kind of malware restricts the access to the infected computer and demands the user pays money to remove the restrictions?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

16. What kind of attack brings down the network or the victim computer?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

17. Regarding antivirus

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

18. Which is the correct sentence regarding firewalls

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

19. When IDS are used

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

20. Which of the following sentences is true regarding firewalls

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

21. Strong authentication methods

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

22. Hardening and OS

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

23. Regarding mobile security

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer