Security+1

You got 1 of 11 possible points.
Your score was: 9 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 2 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible combination of characters from a predetermined list

correct

dictionary

a security attack which uses every possible word from a predetermined list

correct

cross-site scripting (XSS)

a security attack which injects malicious commands into user input data supplied to web applications

incorrect

SQL injection

a security attack which injects malicious commands into user input data supplied to web applications

correct

XML injection

a security attack which injects scripts into web applications

incorrect

buffer overflow

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

correct

ping flood

a security attack which injects ICMP packets into a network which are targeted to a specific host

correct

smurf attack

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

incorrect
Score 0 of 1

Question:

Computer footprinting is:

Response:

the description of the physical space required for a given system

the times and locations of typical usage for a given system, user or service

the description the of the physical space, electrical load, thermal boundaries and noise levels required for a given system

the set of data common to a user across multiple platforms and/or websites (the collection of data from social media, browsing/purchasing history, ads, etc.)

Score 0 of 1

Question:

To accept or reject a wireless device during a RADIUS authentication, the AP must create a data packet containing verification information called the ________.

Response:

verification request

authentication request

accounting request

access request

Score -1 of 1

Question:

What is the number of unique passwords Microsoft suggests before allowing a password to be re-used?

Response:

12

26

13

24