______ exploits a bias of speedy action without careful thought.
A. Carelessness
B. Urgency
C. Obliviousness
D. Restriction
Answer: B. Urgency
Phone calls will only be used by scammers when trying to access an account.
A. True
B. False
Answer: B. False
In a(n) ______ network, devices are physically separated from each other.
A. Disconnected
B. Air-gapped
C. Virtualized
D. VPN
Answer: B. Air-gapped
What does WPS stand for?
A. Wired Preferred System
B. Wireless Protection Solutions
C. Wi-Fi Professional Solutions
D. Wi-Fi Protected Setup
Answer: D. Wi-Fi Protected Setup
What is it called when two hashes are the same?
A. Mathematical Error
B. Overflow
C. Race Condition
D. Collision
Answer: D. Collision
______ exploits a bias of the desire to be exclusive.
A. FOMO
B. FIRE
C. Scarcity
D. Uniqueness
Answer: C. Scarcity
What does LDAP stand for?
A. Listed Directory Access Protocol
B. Logged Directory Access Protocol
C. Licensed Directory Access Protocol
D. Lightweight Directory Access Protocol
Answer: D. Lightweight Directory Access Protocol
Which of the following grades provides the highest security?
A. Grade A
B. Grade 3
C. Grade 2
D. Grade 1
Answer: D. Grade 1
What does the PIN for a WPS consist of?
A. 4 digits followed by 3 letters
B. 7 digits
C. 8 digits
D. 7 characters (can be digits, letters, or symbols)
Answer: C. 8 digits
What is a brute force attack?
A. Physically breaking into a secure repository to steal information
B. Attempting to randomly guess based on some probability what the right answer would be
C. Trying all possible combinations and permutations until the right guess works
D. Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available
Answer: C. Trying all possible combinations and permutations until the right guess works
Which of the following is a phishing attempt directed at a specific target?
A. Spear phishing
B. Bulk phishing
C. Whaling
D. Clone phishing
Answer: A. Spear phishing
______ is a mechanism for software to prove its identity.
A. Authentication
B. Attestation
C. Authorization
D. Accounting
Answer: B. Attestation
Using a ______ attack, you can turn off an HVAC.
A. Brute force
B. Denial of service
C. Differential
D. Frank
Answer: B. Denial of service
What does TKIP stand for?
A. Temporal Key Integrity Protocol
B. Temporary Key In Privacy
C. Temporary Kill Interception Protocol
D. Temperature in Kelvin Includes Physics
Answer: A. Temporal Key Integrity Protocol
______ refers to the randomness collected by a system for use in algorithms that require random data.
A. Chaos
B. Entropy
C. Enthalpy
D. Order
Answer: B. Entropy
What is pharming?
A. Using phishing attacks to get pharmaceuticals
B. Spamming farmers with unwanted agricultural products
C. Harvesting information via free downloadable game
D. Putting malicious scripts onto network servers
Answer: D. Putting malicious scripts onto network servers
What type of trust involves domain B trusting domain A, but domain A not trusting domain B?
A. Non-transitive
B. Transitive
C. One-way
D. Two-way
Answer: C. One-way
What does SRTP stand for?
A. Secret Real-Time Protocol
B. Secure Real-Time Protocol
C. Secure Real-Time Transport Protocol
D. Secret Real-Time Procedure
Answer: C. Secure Real-Time Transport Protocol
Which of the following is true regarding packets sent over a WPA network?
A. Each packet uses an encryption key of increasing size on a counter
B. Every packet uses the same 128-bit encryption key
C. Every packet has a unique 128-bit encryption key
D. Each packet alternates between 64-bit and 128-bit encryption keys
Answer: C. Every packet has a unique 128-bit encryption key
Which of the following is NOT a cryptography limitation hindered by being too large?
A. Time
B. Longevity
C. Speed
D. Size
Answer: B. Longevity
What is the abbreviation used for a Counter Mode with Cipher Block Chaining Message Authentication Mode Protocol?
A. CMWCBCMAMP
B. CCMP
C. CMCBCMAMP
D. CTR CBC MAMP
Answer: B. CCMP