Network Attacks and Security

Network Attacks and Security

11th - 12th Grade

12 Qs

quiz-placeholder

Similar activities

QUIZ KOPLING

QUIZ KOPLING

11th Grade

10 Qs

Cybersecurity Review

Cybersecurity Review

9th - 12th Grade

10 Qs

Grave of the fireflies 1998

Grave of the fireflies 1998

6th - 12th Grade

9 Qs

Pre-Test: Learning Disabilities and Delinquent Behaviors

Pre-Test: Learning Disabilities and Delinquent Behaviors

10th Grade - Professional Development

10 Qs

Internet Security-  eTwinning Project FUN MATH

Internet Security- eTwinning Project FUN MATH

4th - 12th Grade

12 Qs

Komputer Akuntansi (MYOB)

Komputer Akuntansi (MYOB)

11th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Prepare ASAS Ganjil PPTKR

Prepare ASAS Ganjil PPTKR

11th Grade

14 Qs

Network Attacks and Security

Network Attacks and Security

Assessment

Quiz

Education

11th - 12th Grade

Medium

Created by

Hy Fernz

Used 58+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. ARP poisoning is a technique used to:

a. Overwhelm a target server with ICMP ping packers causing a DOS attack.

b. Install malware on victim machines transforming them into zombie agents.

c. Overwhelm a target server with ACK packers exploiting the nature of the 3 way handshake.

d. Alter the MAC address of a computer’s ARP cache so that traffic is directed to a man-in-the-middle instead of the intended destination such as an internet router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is TRUE with regards to the SMURF Flood attack

a. The attacker utilizes large volumes of SYN packets in order to flood the server.

b. The attacker sends an ARP broadcast packet in order to flood the server with ACK packets.

c. With the help of other computers, the attacker floods the server with ping requests.

d. With the help of other computers, the attacker floods the server with ping replies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following elements is most likely to be an issue for Ping flood?

a. Confidentiality

b. Integrity

c. Availability

d. Non-repudiation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following is a technique to mask the source IP address of a network attack?

a. DDoS

b. Replay

c. Sniffing

d. Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following malware is MOST LIKELY used by attackers to carry out Distributed Denial of Services (DDOS) attacks?

a. Trojan.

b. Rootkit

c. Botnet.

d. Adware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statement about IP spoofing is TRUE?

a. The destination IP address of the network packet is changed to another IP address.

b. The source MAC address of the network packet is changed to the hacker’s MAC address.

c. The destination MAC address of the network packet is changed to the hacker’s MAC address.

d. The source IP address of the network packet is changed to another IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes differential backup?

A. A differential backup backs up all the information on the disk to an offline device such as tape.

B. A differential backup backs up only the information that is added since previous differential backup.

C. A differential backup backs up only the information that is added since last full backup.

D. A differential backup backs up only the information that is added since last incremental backup.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?