CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

11th - 12th Grade

43 Qs

quiz-placeholder

Similar activities

EmTechQ1

EmTechQ1

11th Grade

45 Qs

Computer Software

Computer Software

9th - 12th Grade

42 Qs

PAS TLJ KELAS 11

PAS TLJ KELAS 11

11th Grade

40 Qs

JavaScript_Revision

JavaScript_Revision

12th Grade

45 Qs

MIDTERM TEST REVISION 4 GRADE 11

MIDTERM TEST REVISION 4 GRADE 11

11th Grade

40 Qs

Relative pronouns MC

Relative pronouns MC

12th Grade

40 Qs

AIJ - XII TKJ

AIJ - XII TKJ

12th Grade

40 Qs

UAS AIJ kelas XII TKJ

UAS AIJ kelas XII TKJ

11th - 12th Grade

40 Qs

CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Steven Hahn

Used 63+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What attack does this image represent?

Man-In-The-Middle Attack

Baiting Attack

Spoof Attack

Hijack Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a hacker is in between two systems that are communicating, then passes the information back and forth to them without knowing/

In-Between-Attack

Forward-Backward-Attack

Man-In-The-Middle Attack

Side-To-Side Attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker takes over a session between you and another person then disconnects the other person from communication. The other person still believes they are talking to you.

Hijack Attack

In-Between-Attack

Baiting

Spoof Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of attack that sends enough requests to overload a resource or even stopping its operation.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that uses a forgotten IP or MAC address to impersonate a trusted computer.

Man-in-the-Middle
Distributed DoS (DDoS)
SYN Flood 
Spoofing

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the data transmissions are intercepted and recorded by an attacker, then replayed to gain access. This attack is called:

Man-in-the-Middle
Replay
SYN Flood 
Spoofing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?