DCI-MCQ Mock Questions: Load Balancing An Internet Proxies URL Filtering
DCI-MCQ Mock Questions: Load Balancing An Internet Proxies URL Filtering
*Required
1) Actively monitoring data streams in search of
malicious code or behavior is an example of: *
load balancing
an Internet proxies
URL filtering
content inspection
Load balancer
Spam filters
NIDS
Firewall
VLAN segregation
IPSec
IP filters
Log analysis
WPA2-PSK
AES
WPA3-AES
WPA2-3DES
WEP
FTPS implicit
FTPS explicit
MD5
PEAP-TLS
Fuzzing
Static review
Code signing
Regression testing
Rootkit
Backdoor
Keylogger
Script kiddie
Hacktivist
Cryptologist
Security auditor
SAML
XACML
LDAP
Open ID Connect
16) A penetration tester harvests potential usernames
from a social networking site. The penetration tester
then uses social engineering to attempt to obtain
associated passwords to gain unauthorized access to
shares on a network server. Which of the following
methods is the penetration tester MOST likely
using? *
Escalation of privilege
SQL injection
Active reconnaissance
Proxy server
Detective
Preventive
Corrective
Deterrent
Captive portal
OCSP stapling
Key escrow
Passive scan
Aggressive scan
Credentialed scan
Intrusive scan
CBC
Blowfish
MD5
RSA
SFTP
Nslookup
DNSSEC
DIG
24) A workstation puts out a network request to
locate another system. Joe, a hacker on the network,
responds before the real system does, and he tricks
the workstation into communicating with him. Which
of the following BEST describes what occurred? *
Phishing
Man-in-the-middle
Tailgating
Watering hole
Shoulder surfing
dig www.google.com
dig 192.168.1.254
dig workstation01.com
dig 192.168.1.26
Remote exploit
Amplification
Sniffing
Man-in-the-middle
32) Company A has acquired Company B. Company A
has different domains spread globally, and typically
migrates its acquisitions infrastructure under its own
domain infrastructure. Company B, however, cannot
be merged into Company A’s domain infrastructure.
Which of the following methods would allow the two
companies to access one another’s resources? *
Attestation
Federation
Single sign-on
Kerberos
Transference
Avoidance
Mitigation
Acceptance
Vulnerability scanner
Network-based IDS
Vulnerability scanner
Network-based IDS
Network-based IDS
Rainbow tables
Hash tables
Header manipulation
Cookie hijacking
Cross-site scripting
Xml injection
Denial Of Service
MITM Attack
DLL injection
Buffer overflow
Resource exhaustion