Cybersecurity Mastery Test

1.

A network security device that analyses incoming and outgoing network traffic to either allow or block traffic based on rules is called


  • A Decryptor
  • B Firewall
  • C Switch
  • D Router

2.

The use of SSL/TLS protocol is part of


  • A Perimeter Security
  • B Information or File Security
  • C Network Security
  • D Cyber Security

3.

Spoofing is a technique through which an attacker


  • A can gain access to a remote system
  • B can implant malware in a remote system
  • C can pretend to be a known or trusted source of communication
  • D can gain access to PIIs

4.

Phishing is a technique adopted by attackers which enables


  • A To deceive a person to reveal sensitive personal information
  • B To launch a backdoor into the victim’s computer
  • C To launch a denial-of-service attack
  • D To launch a SYN Flood attack

5.

JA3 is a fingerprinting technique used by almost all the NDR solutions, and it is computed from the


  • A Server Hello packet of SSL/TLS protocol
  • B Get Request packet of HTTP protocol
  • C SYN-ACK packet of TCP
  • D Client Hello packet of SSL/TLS protocol

Please enter your name