Take a quick DANTES sample test with our FREE DANTES practice sample questions! These are a quick preview of what kind of information you'll be studying in our DSST Study Guide for this subject. You can also use these DANTES sample test questions to gauge how ready you are to take your DANTES test. How do you know when you are ready? A good way to tell is when you can flip open our DANTES study guide, put your finger on a page, any page, and be able to define and explain what it is you're pointing out. That takes effort. Studying for a DSST test does take effort, but based on your previous and current experience, there may be DANTES tests that you can take with little or no study. Taking a practice DANTES test can tell you if you are ready, it can give you an idea of the content of the DANTES test, it can tell you how difficult or easy your DANTES test will be.
Still learning about DANTES tests or you need more information than just a DANTES sample test? Visit our New Student Center to get a great overview of where to start.
Fundamentals of Cybersecurity DANTES Practice Test
1) __________ is a program or a device that can monitor data travelling over a network.
A) Sniffer
B) Smurfer
C) Spammer
D) None
The correct answer is A:) Sniffer. Sniffers can be used both for legitimate network management
functions and for stealing information.
2) __________ can be accomplished by changing entries in the host file and on a
large scale by changing entries in a DNS server.
A) Pharming
B) Spamming
C) Phishing
D) Cross Scripting
The correct answer is A:) Pharming.
3) __________ is the fastest password cracker, a hacker tool available in market.
A) Nmap
B) Nessus
C) John the Ripper
D) Nikto
The correct answer is C:) John the Ripper.
4) Which is a hacker tool which is a free open source utility for network exploration
or security auditing?
A) Nmap
B) Nessus
C) Nikto
D) John the Ripper
The correct answer is A:) Nmap. Nmap (network mapper) is a free open source utility
for network exploration or security auditing. It was designed to rapidly scan large networks,
although it works fine against single hosts.
5) Which of the following implies protecting information from disclosure from
unauthorized parties?
A) Confidentiality
B) Integrity
C) Availability
D) None
The correct answer is A:) Confidentiality.
6) Which of the following is usually used for protecting the integrity of data?
A) MD5
B) RSA
C) AES
D) None
The correct answer is A:) MD5. The most commonly used methods to protect data
integrity includes hashing the data you receive and comparing it with the hash of the
original message.
7) __________ is an attack on the availability of data
A) DDoS
B) Trojan horse
C) Man-in-the-middle
D) Rootkit
The correct answer is A:) DDoS. Information only has value if the right people can access
it at the right times.
8) __________ can be defined as a specific weakness in security.
A) Threat
B) Vulnerability
C) Loopholes
D) None
The correct answer is B:) Vulnerability. A vulnerability can be defined as a specific
weakness in security (or a lack of security measures)that typically could be exploited
by multiple adversaries having a range of motivations and interest in a lot of different
assets.
9) __________ involves those who discover a way into the network leaving signals
on, or outside the premise to notify others that a vulnerability exists there.
A) War chalking
B) Foot printing
C) War piloting
D) None
The correct answer is A:) War chalking. Once weaknesses have been discovered in a
wireless network, war chalking can occur. War chalking involves those who discover a
way into the network leaving signals (often written in chalk) on, or outside, the premise
to notify others that a vulnerability exists there.
10) In WPA2, CCMP uses a __________ with a 48 bit initialization.
A) 64 bit DES
B) 128 bit AES
C) SHA
D) RSA
The correct answer is B:) 128 bit AES. WPA2 requires counter mode with cipher block
chaining message authentication code protocol (CCMP). CCMP uses 128-bit AES encryption
with a 48-bit initialization vector. The larger initialization vector in WPA2,
increases the difficulty in cracking and minimizes the risk of a replay attack.
Need more practice?
Our Fundamentals of Cybersecurity DANTES Study guide has 90 MORE test questions to help you get ready for the test!