Daily Multiple Choice Test

Which unpatched version of Solaris are vulnerable to the l-froot Telnet authentication bypass
SunOS 5.10 & SunOS 5.11
SunOS 5.6
SunOS 5.8
SunOS 5.12
SunOS 5.10 & SunOS 5.11
What does the first D cover in DDPRR?
Detect
Deter
Digital
Distributed
Detect
What characters may be used to trigger an SQL error
1
What HTTP method can be used to upload a file?
Put
POST
Upload
GET
Put
Which of the following is omitted from IPv6
Broadcasts
SSIDs
DNS
NAT
Broadcasts
Which server supports EAP Passwords
RADIUS
NAS
WAP
WEP
RADIUS
What is encyption most linked to
confidentiality
integrity
availabillity
deniability
confidentiality
Which layer of the OSI Model uses the IP Protocol?
layer 3
layer 2
layer 1
layer 4
layer 3
What is steganography?
The concept of hiding a message within other information
The process of digital watermarking
Carrying out secure key exchange
A legacy security protocol
The concept of hiding a message within other information
The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
128.10.2.30
210.20.2.64
164.100.9.61
148.20.2.30
128.10.2.30
Your Score
Score Label
Score Summary