Masonry MCQs

Masonry MCQs

Our team has conducted extensive research to compile a set of Masonry MCQs. We encourage you to test your Masonry knowledge by answering these multiple-choice questions provided below.
Simply scroll down to begin!

1: ____ is the encryption protocol standard for wpa2.

A.   AES-CCMP

B.   AES-TKIP

C.   AES-CTR

D.   AES-SCMP

2: A ____ is designed to separate a nonsecured area from a secured area.

A.   Lockout

B.   Mantrap

C.   Closet

D.   Pit

3: The ____ list is intended to facilitate the development of a free network exploration tool.

A.   Packet Storm

B.   Snort-snigs

C.   Nmap-hackers

D.   Configuration

4: Symmetric encryption is also called ____ cryptography

A.   Shared key

B.   Private key

C.   Symmetric key

D.   Public key

5: Most bluetooth devices use a class 2 radio that has a range of ____ feet.

A.   15

B.   33

C.   10

D.   18

6: Amsterdam has more than ______ bridges.

A.   1000

B.   1200

C.   1300

D.   1400

7: A ____ cipher rearranges letters without changing them.

A.   Loop

B.   Block

C.   Transposition

D.   Substitution

8: ____ is the time it takes for a key to be pressed and then released.

A.   Lead time

B.   Show time

C.   Dwell time

D.   Sync time

9: ____ is an attack that sends unsolicited messages to bluetooth-enabled devices.

A.   Bluecracking

B.   Bluejacking

C.   Bluetalking

D.   Bluesnarfing

10: The basis for a digital signature rests on the ability of ____ keys to work in both directions.

A.   Asymmetric

B.   Shared

C.   Unique

D.   Symmetric

11: A digital certificate associates _____.

A.   User's public key with his private key

B.   The user's identity with his public key

C.   A user's private key with the public key

D.   A private key with a digital signature

12: A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.

A.   Reverse proxy

B.   End Point

C.   Router

D.   VPN

13: The ____ utility manages a firewall and packet filtering.

A.   Iptables

B.   Netstat

C.   Passwd

D.   Wall

14: The nist ________________ program establishes guidelines for selecting and using forensics tools.

A.   CFTT.

B.   Integrity

C.   Hashing

D.   Encryption

15: The signal from an id badge is detected as the owner moves near a ____, which receives the signal.

A.   Proximity reader

B.   Mantrap

C.   Barcode scanner

D.   Magnetic scanner

16: The sql injection statement ____ erases the database table.

A.   - whatever'; DROP TABLE members; --

B.   - whatever'; DELETE TABLE members; --

C.   - whatever'; UPDATE TABLE members; --

D.   - whatever'; RENAME TABLE members; --

17: Unencrypted information is called ____.

A.   Plain text

B.   Simpletext

C.   Cipher text

D.   Physical, logical

18: The sql injection statement ____ finds specific users.

A.   - whatever' OR full_name = '%Mia%'

B.   - whatever' OR full_name IS '%Mia%'

C.   - whatever' OR full_name LIKE '%Mia%'

D.   - whatever' OR full_name equals '%Mia%'

19: The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.

A.   Digital signature

B.   Encrypted signature

C.   Hash

D.   Digital certificate

20: A(n) _____ is a published set of rules that govern the operation of a pki.

A.   Certificate policy (CP).

B.   Extended Validation (EV) Certificate

C.   Certificate Repository (CR)

D.   Certificate Authority (CA)

21: To create a rainbow table, each ____ begins with an initial password that is encrypted.

A.   Chain

B.   Block

C.   Link

D.   Pass

22: An ____ is an ap that is set up by an attacker.

A.   Active twin

B.   Internal replica

C.   Evil twin

D.   Authorized twin

23: An example of _____ of data would be if a computer virus eliminated files on that computer.

A.   Disruption

B.   Controlled chaos

C.   Intrusion

D.   Destruction

24: Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.

A.   De formale

B.   De jure

C.   De public

D.   De facto

A.   Asymmetric

B.   Symmetric

C.   Shared

D.   Public key

26: In the uac dialog boxes, the color ____ indicates the lowest risk.

A.   Gray

B.   Green

C.   Yellow

D.   Red

27: In md5, the length of a message is padded to ____ bits.

A.   32

B.   64

C.   128

D.   512