1. What is the best way to defend against network sniffing?
A) Registering all machines MAC address in a Centralized Database
B) Using encryption protocols to secure network communications
C) Using static IP Address
D) Restricting physical access to server rooms hosting Critical Servers
2. An NMAP scan of a server shows that port 69 is open. What risk could this pose?
A) Weak SSL Version
B) Unauthenticated Access
C) Web Portal Data Leak
D) Cleartext Login
3. Which of the following viruses is usually targeted at Microsoft Office products?
A) Multipart Virus
B) Polymorphic Virus
C) Stealth Virus
D) Macro Virus
4. Define a -collision attackΒ in cryptography?
A) Collision attacks try to get the public key
B) Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
C) Collision attacks try to find two inputs producing the same hash
D) Collision attacks try to break the hash into three parts to get the plaintext value
5. Which of the following provide the most information about the system-s security posture?
A) Port Scanning, Service Identification, Banner Grabbing
B) Phishing, Spamming, Sending Trojans
C) Social Engineering, Tailgating, Company Site Browsing
D) Wardriving, Social Engineering, Warchalking