Basic Cryptography
Public Key Infrastructure (PKI) and Cryptographic Protocols
Networking Threats, Assessments, and Defenses
Network Security Appliances and Technologies
A Little of Everything
100

This feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action.

a. Confidentiality
b. Nonrepudiation
c. Obfuscation
d. Authentication

What is nonrepudiation?

100

This is a standard format for digital certificates.

a. JPG
b. .cer
c. MPEG-4 Part 14
d. X.509

What is d. X.509

100

This is a layer 2 attack.

     a. DNS poisoning
     b.DNS hijacking
     c. ARP poisoning
     d. DDoS

What is c. ARP poisoning

100

The best description of a mantrap.

a. A mantrap separates threat actors from defenders.
b. A mantrap cools a server room by trapping body heat.
c. A mantrap is a small space with two separate sets of interlocking doors.
d. A mantrap is a challenge given to cybersecurity experts.

What is c. A mantrap is a small space with two separate sets of interlocking doors.

100

This attack sees an attacker attempt to determine the hash function's input strings that produce the same hash result.

a. Known ciphertext attack
b. Downgrade attack
c. Collision attack
d. Birthday attack

What is c. Collision attack

200

This encryption method will provide the highest security against attacks.

a. AES
b. RC4
c. Blowfish
d. 3DES

What is AES encryption?

200

This is a process where a key is divided into a specific number of parts and distributed to multiple people, with some of them having the same parts of the key.

     a. Renewal
     b. Revocation
     c. M-of-N control
     d. Key escrow

What is c. M-of-N control.

200

This tool will allow you to change the permissions of a file on a Linux system so that the file can only be accessed by its owner.

a. chmod
b. grep
c. Nessuss
d. Cuckoo

What is a. chmod?

200

Outlining the process of a proxy server.

a. User - internet - reverse proxy - forward proxy - user
b. User - forward proxy - Internet - reverse proxy - server
c. User - reverse proxy - Internet - forward proxy - server
d. User - forward proxy - user - reverse proxy - Internet

What is b. User - forward proxy - Internet - reverse proxy - server

200

This sensor is best suited for fire detection?

a. Proximity sensor
b. Temperature detection sensor
c. Motion detection sensor
d. Noise detection sensor

What is b. Temperature detection sensor

300

In this cipher, the entire alphabet is rotated (as in, A=N, B=O), making it difficult to identify. 

a. 3DES
b. ROT13
c. XOR
d. AES

What is, b. ROT13

300

Alliance Consulting, a company based in France, is shutting down. Louis, the owner of the company, applied to revoke his digital certificate. He is very busy with the other details of shutting the company down and needs to be able to check the certificate's status quickly and easily. This will help him get a real-time lookup of the certificate's status.

a. CRL
b. OCSP
c. CSR
d. EV

What is b. OCSP

300

Essentially, a man-in-the-middle (MITM) attack versus a man-in-the-browser (MITB) attack.

     a.     A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and web server.
     b.     A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and underlying computer.
     c.     A MITM attack can modify the intercepted packet, whereas a MITB attack can only analyze it.
     d.     A MITM attack can only analyze the intercepted packet, whereas a MITB attack can modify the intercepted packet.

What is b. A MITM attack occurs between two endpoints, whereas a MITB attack occurs between a browser and underlying computer.

300

This monitoring methodology will trigger the IDS if any application tries to scan multiple ports.

a. Signature-based monitoring
b. Heuristic monitoring
c. Anomaly-based monitoring
d. Behavior-based monitoring

What is b. Heuristic monitoring

300

A company has multiple CAs and intermediate CAs issuing digital certificates in different departments, with no one cross-checking their work, for instance, in this trust model.

a. Hierarchical trust model
b. Bridge trust model
c. Web of trust model
d. Distributed trust model

What is d. Distributed trust model

400

This algorithm encrypts and decrypts data using the same key.

What is the Symmetric cryptographic algorithm.

400

John had to send certain confidential data and messages to Sarah online. The use of this will ensure that the message's sender is, in fact, John.

What is a digital certificate?

400

For instance, David sent a message to Tina saying, "There is no school today!" For some reason, the message showed up on Tina's device as, "Come to the school ASAP!" 

What is a MITM attack?

400

The best description of a host-based firewall.

What is A host-based firewall is a software firewall that protects a single endpoint device.

400

This protocol is used to prevent looping in a switch.

What is STP?

500

This process is used along with asymmetric cryptography to verify that a received encrypted document is real, from the original sender, and unaltered?

What is the Digital signature algorithm?

500

Sarah needs to send an email with important documents to her client. This protocol ensures that the email is secure.

What is S/MIME?

500

This type of attack occurs when a threat actor redirects network traffic by modifying the local host file to send legitimate traffic anywhere they choose.

What is DNS poisoning?

500

This type of intrusion detection system can also block attacks.

What is Inline?

500

When you are a security expert asked to protect the webservers hosted in your building from exposure to anyone other than server admins, this is the physical security method you should implement.

What is a Faraday cage?

M
e
n
u