Exame in English

Exam Questionnaire

Examination Questionnaire

Question 1: What is the purpose of encryption?

Question 2: What does IDS mean in relation to network security?

Question 3: What is a brute force attack?

Question 4: What is the purpose of the information security policy?

Question 5: Which of the following is a symmetric encryption technique?

Question 6: Which of the following is not a threat detection technique?

Question 7: What is a DDoS (Distributed Denial of Service) attack?

Question 8: Which of the following is an example of asymmetric encryption?

Question 9: What is a social engineering attack?

Question 10: What is the purpose of an information security policy?

Question 11: Which of the following is a public key cryptography technique?

Question 12: What does VPN mean in terms of network security?

Question 13: What is the main purpose of a firewall?

Question 14: What is the main difference between symmetric and asymmetric encryption?

Question 15: What is a phishing attack?

Question 16: Which of the following actions is not recommended in network security?

Question 17: What is a denial of service (DoS) attack?

Question 18: What is a next generation firewall (NGFW)?

Question 19: What is a SQL injection attack?

Question 20: What is the main purpose of a penetration test (pentest)?

Question 21: What is the main function of an IDS (Intrusion Detection System)?

Question 22: What is the main purpose of data encryption?

Question 23: What is a brute force attack?

Question 24: What is a reverse engineering attack?

Question 25: How important is two-factor authentication (2FA) in security?

Question 26: What is a strong password policy?

Question 27: What is a ransomware attack?

Question 28: What is a spear phishing attack?

Question 29: What is an SSL certificate?

Question 30: What is a social engineering attack?

Question 31: What is the main function of a WAF (Web Application Firewall)?

Question 32: What is a hash algorithm in cryptography?

Question 33: What is a social engineering attack?

Question 34: What is the main function of a WAF (Web Application Firewall)?

Question 35: What is a hash algorithm in cryptography?

Question 36: What is two-factor authentication (2FA)?

Question 37: What is a denial of service (DDoS) attack?

Question 38: What is an application firewall (WAF)?

Question 39: What is a social engineering attack?

Question 40: What is the main function of a WAF (Web Application Firewall)?

Question 41: What is a hash algorithm in cryptography?

Question 42: What does the acronym VPN mean in computer networks?

Question 43: What is a phishing attack?

Question 44: What is a digital certificate?

Question 45: What is a brute force attack in network security?

Question 46: What is an IDS (Intrusion Detection System)?

Question 47: What is public key cryptography?

Question 48: What is the main function of a next-generation firewall (NGFW)?

Question 49: What is an SSL (Secure Sockets Layer) VPN?

Question 50: What is a SQL injection attack?

Time remaining: 50:00

Results:

Score: 0 points

Status: Awaiting shipment