Social Engineering
Authentication
Security Protocols
Wireless

Cryptography
100

______ exploits a bias of speedy action without careful thought.
   A. Carelessness
   B. Urgency
   C. Obliviousness
   D. Restriction

Answer: B. Urgency

100

Phone calls will only be used by scammers when trying to access an account.
   A. True
   B. False

Answer: B. False

100

In a(n) ______ network, devices are physically separated from each other.
   A. Disconnected
   B. Air-gapped
   C. Virtualized
   D. VPN

Answer: B. Air-gapped

100

What does WPS stand for?
   A. Wired Preferred System
   B. Wireless Protection Solutions
   C. Wi-Fi Professional Solutions
   D. Wi-Fi Protected Setup

Answer: D. Wi-Fi Protected Setup

100

What is it called when two hashes are the same?
   A. Mathematical Error
   B. Overflow
   C. Race Condition
   D. Collision

Answer: D. Collision

200

______ exploits a bias of the desire to be exclusive.
   A. FOMO
   B. FIRE
   C. Scarcity
   D. Uniqueness

Answer: C. Scarcity

200

What does LDAP stand for?
   A. Listed Directory Access Protocol
   B. Logged Directory Access Protocol
   C. Licensed Directory Access Protocol
   D. Lightweight Directory Access Protocol

Answer: D. Lightweight Directory Access Protocol

200

Which of the following grades provides the highest security?
   A. Grade A
   B. Grade 3
   C. Grade 2
   D. Grade 1

Answer: D. Grade 1

200

What does the PIN for a WPS consist of?
   A. 4 digits followed by 3 letters
   B. 7 digits
   C. 8 digits
   D. 7 characters (can be digits, letters, or symbols)

Answer: C. 8 digits

200

What is a brute force attack?
   A. Physically breaking into a secure repository to steal information
   B. Attempting to randomly guess based on some probability what the right answer would be
   C. Trying all possible combinations and permutations until the right guess works
   D. Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

Answer: C. Trying all possible combinations and permutations until the right guess works

300

Which of the following is a phishing attempt directed at a specific target?
   A. Spear phishing
   B. Bulk phishing
   C. Whaling
   D. Clone phishing

Answer: A. Spear phishing

300

______ is a mechanism for software to prove its identity.
   A. Authentication
   B. Attestation
   C. Authorization
   D. Accounting

Answer: B. Attestation

300

Using a ______ attack, you can turn off an HVAC.
   A. Brute force
   B. Denial of service
   C. Differential
   D. Frank

Answer: B. Denial of service

300

What does TKIP stand for?
   A. Temporal Key Integrity Protocol
   B. Temporary Key In Privacy
   C. Temporary Kill Interception Protocol
   D. Temperature in Kelvin Includes Physics

Answer: A. Temporal Key Integrity Protocol

300

______ refers to the randomness collected by a system for use in algorithms that require random data.
   A. Chaos
   B. Entropy
   C. Enthalpy
   D. Order

Answer: B. Entropy

400

What is pharming?
   A. Using phishing attacks to get pharmaceuticals
   B. Spamming farmers with unwanted agricultural products
   C. Harvesting information via free downloadable game
   D. Putting malicious scripts onto network servers

Answer: D. Putting malicious scripts onto network servers

400

What type of trust involves domain B trusting domain A, but domain A not trusting domain B?
   A. Non-transitive
   B. Transitive
   C. One-way
   D. Two-way

Answer: C. One-way

400

What does SRTP stand for?
   A. Secret Real-Time Protocol
   B. Secure Real-Time Protocol
   C. Secure Real-Time Transport Protocol
   D. Secret Real-Time Procedure

Answer: C. Secure Real-Time Transport Protocol

400

Which of the following is true regarding packets sent over a WPA network?
   A. Each packet uses an encryption key of increasing size on a counter
   B. Every packet uses the same 128-bit encryption key
   C. Every packet has a unique 128-bit encryption key
   D. Each packet alternates between 64-bit and 128-bit encryption keys

Answer: C. Every packet has a unique 128-bit encryption key

400

Which of the following is NOT a cryptography limitation hindered by being too large?
   A. Time
   B. Longevity
   C. Speed
   D. Size

Answer: B. Longevity

500

What is the abbreviation used for a Counter Mode with Cipher Block Chaining Message Authentication Mode Protocol?
   A. CMWCBCMAMP
   B. CCMP
   C. CMCBCMAMP
   D. CTR CBC MAMP

Answer: B. CCMP