Local Area Networks (LAN) are connected to what?
A) WiFI
B) WAN
C) TAN
D) MAN
Give this one a try later!
B) WAN
What is port 80 used for?
A) HTTP
B) HTTPS
C) FTP
D) RDP
,Give this one a try later!
A) HTTP
How many layers does the TCP model have?
A) 2
B) 1
C) 4
D) 7
Give this one a try later!
C) 4
When Pritha started working for Triffid, Inc., Pritha had to sign a policy that described
how Pritha would be allowed to use Triffid's IT equipment. What policy was this? (D5.3,
L5.3.1)
A) The organizational security policy
B) The acceptable use policy (AUP)
C) The bring-your-own-device (BYOD) policy
D) The workplace attire policy
Give this one a try later!
B) The acceptable use policy (AUP)
,The section of the IT environment that is closest to the external world; where we
locate IT systems that communicate with the Internet. (D4.3 L4.3.3)
A) VLAN
B) DMZ
C) MAC
D) RBAC
Give this one a try later!
B) DMZ
What are the three cloud service categories?
A) SaaS, IaaS, PaaS
B) SaaS, MaaS, TaaS
C) FaaS, EaaS, PaaS
D) FaaS, MaaS, TaaS
Give this one a try later!
A) SaaS, IaaS, PaaS
Cyril wants to ensure all the devices on his company's internal IT environment are
properly synchronized. Which of the following protocols would aid in this effort? (D4,
L4.1.2)
A) FTP (File Transfer Protocol)
B) NTP (Network Time Protocol)
C) SMTP (Simple Mail Transfer Protocol)
D) HTTP (Hypertext Transfer Protocol)
, Give this one a try later!
B) NTP (Network Time Protocol)
Wi-Fi Protected Access (WPA) changes keys with the ______________ Key Integrity Protocol
(TKIP).
A) Traditional
B) Temporary
C) Temporal
D) Tailored
Give this one a try later!
C) Temporal
What is the most important control to apply to smart devices?
A) Intrusion detection
B) Application firewalls
C) Wrappers
D) Network segmentation
Give this one a try later!
D) Network segmentation
Wi-Fi Protected Access v2 (WPA2) adds security with _____________.
A) WiFI
B) WAN
C) TAN
D) MAN
Give this one a try later!
B) WAN
What is port 80 used for?
A) HTTP
B) HTTPS
C) FTP
D) RDP
,Give this one a try later!
A) HTTP
How many layers does the TCP model have?
A) 2
B) 1
C) 4
D) 7
Give this one a try later!
C) 4
When Pritha started working for Triffid, Inc., Pritha had to sign a policy that described
how Pritha would be allowed to use Triffid's IT equipment. What policy was this? (D5.3,
L5.3.1)
A) The organizational security policy
B) The acceptable use policy (AUP)
C) The bring-your-own-device (BYOD) policy
D) The workplace attire policy
Give this one a try later!
B) The acceptable use policy (AUP)
,The section of the IT environment that is closest to the external world; where we
locate IT systems that communicate with the Internet. (D4.3 L4.3.3)
A) VLAN
B) DMZ
C) MAC
D) RBAC
Give this one a try later!
B) DMZ
What are the three cloud service categories?
A) SaaS, IaaS, PaaS
B) SaaS, MaaS, TaaS
C) FaaS, EaaS, PaaS
D) FaaS, MaaS, TaaS
Give this one a try later!
A) SaaS, IaaS, PaaS
Cyril wants to ensure all the devices on his company's internal IT environment are
properly synchronized. Which of the following protocols would aid in this effort? (D4,
L4.1.2)
A) FTP (File Transfer Protocol)
B) NTP (Network Time Protocol)
C) SMTP (Simple Mail Transfer Protocol)
D) HTTP (Hypertext Transfer Protocol)
, Give this one a try later!
B) NTP (Network Time Protocol)
Wi-Fi Protected Access (WPA) changes keys with the ______________ Key Integrity Protocol
(TKIP).
A) Traditional
B) Temporary
C) Temporal
D) Tailored
Give this one a try later!
C) Temporal
What is the most important control to apply to smart devices?
A) Intrusion detection
B) Application firewalls
C) Wrappers
D) Network segmentation
Give this one a try later!
D) Network segmentation
Wi-Fi Protected Access v2 (WPA2) adds security with _____________.