Network Security Concepts (Part 2)

Network Security Concepts (Part 2)

University

23 Qs

quiz-placeholder

Similar activities

informatikanın nezeri esasları

informatikanın nezeri esasları

University

20 Qs

Threats To A Computer

Threats To A Computer

KG - University

20 Qs

Network ports

Network ports

1st Grade - University

20 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

Redes I_1ra_ 2022-II

Redes I_1ra_ 2022-II

University

20 Qs

UH 1 TLJ XII

UH 1 TLJ XII

1st Grade - University

20 Qs

Week 11 Quiz 2

Week 11 Quiz 2

10th Grade - University

20 Qs

อินเตอร์เน็ตเพื่อการเรียนรู้

อินเตอร์เน็ตเพื่อการเรียนรู้

University

20 Qs

Network Security Concepts (Part 2)

Network Security Concepts (Part 2)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Jorge Valdez

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is tailgating?

Reconnaissance

Access

DoS

Social Engeniering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is a password attack?

Reconnaissance

Access

DoS

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is port scanning?

Reconnaissance

Access

DoS

Social Engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is man-in-the-middle?

Reconnaissance

Access

DoS

Social Engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is address spoofing?

Reconnaissance

Access

DoS

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication?

Address Spoofing Attack

Amplification and Reflection Attacks

ICMP Attack

MITM Attack

Session Hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack is being used when threat actors gain access to the physical network, and then use an MITM attack to capture and manipulate a legitimate user’s traffic?

Address Spoofing Atack

Amplification and Reflection Attacks

ICMP Attack

MITM Attack

Session Hijacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?