0% found this document useful (0 votes)
5 views

Security

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Security

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1 Q – The goal of Security is to protected:

A) Confidentiality B) Maintain integrity C) Assure availability D) All

2 Q - Vulnerabilities are always their in

A – Application B - Network Protocols C – Operating Systems D – All

3 Q – Which of the following is not include in Network infrastructure?

A – Router B - Switch C – connector D – Server

4 Q- Common Network Security terms are:

A – Threat B - Vulnerability C - Risk D – All

5 Q – Which is the prime function of security for organization?

A – Protecting of assets B – Management C – Cast Saving D – None of these

6 Q – MDM means:

A – Mobile Device Management B – Mobile Destination Management C – Mobile Device Managers


D–Non

7 Q- SCP means:
A – Security communication protocol B –Secure Copy Protocol C - Security Command
protocol D – C is correct

8 Q- SNMP default port number:

A – 162 B - 161 C - 164 D –123

9 Q- SNMP Default protocol is:

A - UDP B - TCP C –Layer 2 protocol D – C is correct


10 Q – NTP Server port number is:

A – 124 B - 126 C - 164 D –123

11 Q- The primary intention of a Hacktivist is to bring public attention to:

A - Political matter. B – Technology C – Self D – Device Security

12 Q- Which one is not SSH Feature?

A – Secure protocol B - Difficult to decrypt C – Run port 23 D – work on all OS

13 Q- Vulnerability broker refers to:

A – Black hat B – Grey hat C – Red hat D – Non

14 Q- A network of infected hosts is called:

A – Secure B –Handler C - Botnet D –Non

15 Q- The Compromised Computers are called:

A - Botnet B -Handler C - Secure D – Zombies

16 Q- How many versions has SNMP?

A – 2 versions B -3 versions C -5 versions D – 6 versions

17 Q- Authentication Modes are:

A – Network Based B – Local Based C – Server Based D – B and C

18 Q- Attack can be defined as action taken by an attacker to harm:

A - Mind B - Device C – Asset D – Benefits

19 Q - which of the following is not type of access attacks?

A - Password B – Port redirection C – Gain access D – Buffer overflow

20 Q- SNMP Server port number is:

A - 152 B - 161 C - 163 D –123

21 Q- Which are the Social Engineering Attacks?

A - Spam B - Phishing C – Baiting D –All

22 Q- Which version of SNMP has Encryption?

A – version 1 B – Version 2 C – Version 3 D – A is correct


23 Q- few reasons that why hackers use access attacks are:

A - To retrieve data B - To gain access C - To escalate access privileges D – ALL

24 Q- which of the following is not feature of Telnet?

A – No encryption B – Work on All OS C – Not Secure D – A is correct

1- 25 Q- which one is the areas of router security?

A - Physical Security B- Router OS and Configuration file security C- Router Hardening D- All
1- Write the vectors of Data loss?

1) Email/Web mail 2) Unencrypted Device 3) Cloud Storage Devices 4) Removable Media 5) Hard
copy 6- Improper Access control

2- Write the goal of Security?

The Goal of Security are protected confidentiality, maintain integrity and assure availability.

3- Explain What is Vulnerability?

Vulnerability can be defined a weakness in a system or its design. Vulnerabilities are always there in
Application, Network Protocols and Operating System etc. An attacker to gain access to organization's
network can exploit vulnerability.

4- Define what is Countermeasure?

Countermeasure is an action initiated by the organization typically security professionals to mitigate a


threat.

5- Write the outside perimeter of security?


 On-premise Security officers
 Fences and gates
 Continuous video surveillance
 Security breach alarms
6- Write the inside perimeter of Security?
 Electronic motion detectors
 Security man traps
 Continuous video surveillance
 Biometric access and exit sensors
7- Write meaning of this abbreviations (MDM, DLP, DHCP, SIO, DoS )

Mobile Device Managers, Data loss prevention, Dynamic Host Configuration Protocol, Security
intelligence Operation, Denial of Service,

8- Explain who is Script Kiddie?

A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools
to breaks into computer networks. He often uses downloaded hacking tolls from internet
written by other hacker’s/security experts.

9- Explain Hacktivist hacker?

I hacker with political intentions The Hacktivist has the same skills as that hacker and uses the
same tolls as the hacker. The primary intention of a hacktivist is to bring public attention to
political matter.
10- What are the modern hacking titles?

Script kiddies, Vulnerability Brokers, Hacktivists, Cyber Criminals, State Sponsored Hackers,

11- Which device are including in network infrastructure?

The network infrastructure includes routers, switches, servers, endpoints, and other devices

12- Writ four tasks of Secure Administrative Access?

1 Restrict deice accessibility 2 Log and account for all access


3 Authenticate access 4 Authorize action

13- Writ four guidelines of Strong Passwords?

Use a password length of 10 or more characters.


Include a mix of uppercase, lowercase, numbers, symbols and space.
Deliberately misspell a password.
Change password often.

14- Write difference between SSH and Telnet?


SSH Telnet
Runs on port 22 Runs on port 23
Secure protocol not Secure protocol
Difficult to decrypt no data encryption
All popular operating system Linux, Windows

15- Explain What is SNMP?

Simple Network Management Protocol is an internet standard protocol used to monitor and
manage network device connected over an IP. Devices like routers, switches, firewalls, servers,
CCTV cameras and wireless devices communicate using SNMP.

16- Define What is Network Time Protocol?


The NTP is a networking protocol for clock synchronization between computer systems over
packet-switched, Variable-latency data network.

17- Wirt the mean of this abbreviations (CDP, LLDP, SNMP, NTP, AAA)?
Cisco Discovery Protocol, Link Layer Discovery Protocol, Simple Network Management Protocol,
Network Time Protocol, Authentication Authorization Accounting.

18- What is the deference between Authentication and Authorization?

• Authentication ensures a device or end-user is legitimate


• Authorization allows or disallows authenticated users access to certain areas and
programs on the network.

19- What is Authentication?
Authentication is referring to unique identifying information from each system user generally in
the form of a username and password. System

20- Explain What is Authorization?


Authorization is referring to the process of adding or denying individual user access to computer
network and its resources. Users may be given different authorization levels that limit their
Authorization to the network resources.

21- What is deference between TACACS and RADIUS?

• TACACS+ separates authentication from authorization


• RADIUS does not separate authentication from authorization

22- Writ Types of accounting information?

1 Network 2 Connection
3 EXEC 4 System
5 Command 5 Resource

23- Define what is SCP?


Secure Copy Protocol is used to transfer files in encrypted form to remote host.

24- Writ the Consequences of protocol spoofing?


o Redirect traffic to create routing loops.
o Redirect traffic so it can be monitored on an insecure link
o Redirect traffic to discard it.
25- Write the full form of this abbreviations (CoPP, CEF, LLDP, Syslog, CSO)
Control of Plane Policing, Cisco Express Forwarding, Link Layer Discovery Protocol, System
Logging, Chief Security officer.

26- Write meaning of this abbreviations (CIO, SSH, NTP, ESA, WSA)
CIO (Chief Information Officer), SSH (Secure Shell), NTP (Network Time Protocol), ESA (Email
Security Appliance) WSA (Web Security Appliance)

27- Writ three areas of router security?

1- Physical Security 2- Router OS and Configuration file security 3- Router Hardening


28- Writ the Common Network Security terms?
Common Network Security terms are:
Threat
Vulnerability
Mitigation
Risk

29- Define What is Threat and Attack?


• Threat can be defined as anything danger to an Asset. Threat can be accidentally
triggered or intentionally exploited.
• Attack can be defined as action taken by an attacker to harm an asset.

30- Writ the VM-Specific Threats?


VM specific Threats are (Hyper jacking, Instant On activation, Antivirus storm)

31- Writ the Components of a Secure Data Center?


The Components of a Secure data center are (Secure segmentation, Threat Defense, Visibility)

32- Define What is Hyper Jacking?


Hyper Jacking is an attack in which a hacker takes malicious control over the hypervisor that
create virtual environment with in virtual machine.

33- Define what is Vulnerability broker?


Vulnerability broker refers to grey hat hackers who attempt to discover exploits and report
them to venders, sometimes for prizes or rewards

34- Writ the 6 types of Malware attack?


1 Ransomware 2 Scareware 3 Spyware
4 Phishing 5 Adware 6 Rootkits

35- Writ few reasons why hackers use access attacks?


Hackers use access attacks:
To retrieve data To gain access To escalate access privileges

You might also like