Application/Service Attacks
Quiz
•
Computers
•
KG - Professional Development
•
Hard
Kai Grant
Used 8+ times
FREE Resource
Enhance your content in a minute
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DoS
An attack on a computer or network
device in which multiple computers send data and requests to the device in an attempt
to overwhelm it so that it cannot perform normal operations
An attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems
An attack from a single source that attempts to disrupt the services provided by the attacked system
An attack that changes the registration of a domain name without permission from the owner
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DDoS
An attack from a single source that attempts to disrupt the services provided by the attacked system
An attack that increases the amount of bandwidth sent to a victim
DNS Poisoning-An attack that modifies or corrupts DNS result
The process of gaining elevate rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges
An attack on a computer or network
device in which multiple computers send data and requests to the device in an attempt
to overwhelm it so that it cannot perform normal operations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Man-in-the-middle
An attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems
An attack that misleads systems about the actual MAC address of a system
A vulnerability or bug that is unknown to trusted sources but can be exploited by attackers
An attack that changes the registration of a domain name without permission from the owner
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Buffer overflow
An attack that tricks users into clicking something other than what they think they're clicking
An error that occurs when an application receives more input, or different input, than it expects. It exposes system memory that is normally inaccessible
An attack where the data is captured and replayed. Attackers typically modify data before replaying it
An attack that injects code or commands
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Injection
A driver manipulation method. Developers rewrite the code without changing the driver's behavior
The process of gaining elevate rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges
The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called typosquatting
An attack that injects code or commands
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cross-Site Scripting (XSS)
A web application attack. XSRF attacks trick users into performing actions on websites, such as making purchases, without their knowledge
A password attack that captures and uses the hash of a password. It attempts to log on as the hash and is commonly associated with the Microsoft NTLM protocol
A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site
An attack from a single source that attempts to disrupt the services provided by the attacked system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cross-Site Request Forgery
A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site
An attack that changes the source IP address
A web application attack. XSRF attacks trick users into performing actions on websites, such as making purchases, without their knowledge
An attack where the data is captured and replayed. Attackers typically modify data before replaying it
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
7ICT - Algorithms Revision Quiz
Quiz
•
7th Grade
15 questions
Начала программирования на языке Паскаль
Quiz
•
8th - 11th Grade
16 questions
Algo Quiz
Quiz
•
University
15 questions
[RB3-Ch9] Application of Computers
Quiz
•
8th Grade
13 questions
Word Processor
Quiz
•
4th Grade
20 questions
Grade 8 Software Quiz
Quiz
•
8th Grade
20 questions
DI (EM24) - Diseño de Contenidos (T8)
Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Company Logos
Quiz
•
6th - 8th Grade
13 questions
PowerPoint Basics
Quiz
•
6th - 8th Grade
10 questions
App Creators Lesson 2.1-2.4
Quiz
•
8th Grade
10 questions
Exploring Computer Science Careers and Subfields
Interactive video
•
6th - 10th Grade
15 questions
AP CSP Unit 4
Quiz
•
10th - 12th Grade
45 questions
Cybersecurity Quiz
Quiz
•
12th Grade
23 questions
Prog 1 Python Q1 Practice
Quiz
•
9th - 12th Grade
20 questions
logo quiz
Quiz
•
3rd Grade
