CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

11th - 12th Grade

43 Qs

quiz-placeholder

Similar activities

Sharing Data

Sharing Data

11th Grade

40 Qs

PHOTOPEA TEST-补考

PHOTOPEA TEST-补考

11th Grade

42 Qs

Ôn thi giữa kì 1 - Tin học - 11a3

Ôn thi giữa kì 1 - Tin học - 11a3

11th Grade

40 Qs

SOALAN DIAGNOSTIK- TEORI MRSM TINGKATAN 1 2020

SOALAN DIAGNOSTIK- TEORI MRSM TINGKATAN 1 2020

7th - 12th Grade

40 Qs

Photoshop Review

Photoshop Review

9th - 11th Grade

43 Qs

Information Technology, the Internet, and You

Information Technology, the Internet, and You

12th Grade - University

46 Qs

SMK Alqi, XI TKJ Adminjar

SMK Alqi, XI TKJ Adminjar

11th Grade

40 Qs

4-12 & 4-13 PLC Classwork

4-12 & 4-13 PLC Classwork

9th - 12th Grade

40 Qs

CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Steven Hahn

Used 63+ times

FREE Resource

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What attack does this image represent?

Man-In-The-Middle Attack

Baiting Attack

Spoof Attack

Hijack Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a hacker is in between two systems that are communicating, then passes the information back and forth to them without knowing/

In-Between-Attack

Forward-Backward-Attack

Man-In-The-Middle Attack

Side-To-Side Attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker takes over a session between you and another person then disconnects the other person from communication. The other person still believes they are talking to you.

Hijack Attack

In-Between-Attack

Baiting

Spoof Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of attack that sends enough requests to overload a resource or even stopping its operation.
Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.
Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that uses a forgotten IP or MAC address to impersonate a trusted computer.
Man-in-the-Middle
Distributed DoS (DDoS)
SYN Flood 
Spoofing

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the data transmissions are intercepted and recorded by an attacker, then replayed to gain access. This attack is called:
Man-in-the-Middle
Replay
SYN Flood 
Spoofing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?