CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

11th - 12th Grade

43 Qs

quiz-placeholder

Similar activities

مراجعه اول ثانوي

مراجعه اول ثانوي

11th Grade

47 Qs

MYOB Asyiik

MYOB Asyiik

11th Grade

40 Qs

TJBL  (JARINGAN BERBASIS LUAS)

TJBL (JARINGAN BERBASIS LUAS)

11th Grade

40 Qs

SIMULASI AM TIK

SIMULASI AM TIK

9th - 12th Grade

40 Qs

Sumatif Tengah Sem2  Informatika 11F

Sumatif Tengah Sem2 Informatika 11F

11th Grade

40 Qs

All About Computers

All About Computers

9th - 12th Grade

40 Qs

UTS1 XII TKJ B Teknologi Layanan Jaringan

UTS1 XII TKJ B Teknologi Layanan Jaringan

12th Grade

40 Qs

AIJ XII TKJ - LOAD BALANCING

AIJ XII TKJ - LOAD BALANCING

12th Grade

40 Qs

CompTIA Security + Chapter 6

CompTIA Security + Chapter 6

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Steven Hahn

Used 63+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What attack does this image represent?

Man-In-The-Middle Attack

Baiting Attack

Spoof Attack

Hijack Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a hacker is in between two systems that are communicating, then passes the information back and forth to them without knowing/

In-Between-Attack

Forward-Backward-Attack

Man-In-The-Middle Attack

Side-To-Side Attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker takes over a session between you and another person then disconnects the other person from communication. The other person still believes they are talking to you.

Hijack Attack

In-Between-Attack

Baiting

Spoof Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of attack that sends enough requests to overload a resource or even stopping its operation.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that uses a forgotten IP or MAC address to impersonate a trusted computer.

Man-in-the-Middle
Distributed DoS (DDoS)
SYN Flood 
Spoofing

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the data transmissions are intercepted and recorded by an attacker, then replayed to gain access. This attack is called:

Man-in-the-Middle
Replay
SYN Flood 
Spoofing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?