Search Header Logo

Network Attacks and Security

Authored by Hy Fernz

Education

11th - 12th Grade

12 Questions

Used 60+ times

Network Attacks and Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. ARP poisoning is a technique used to:

a. Overwhelm a target server with ICMP ping packers causing a DOS attack.

b. Install malware on victim machines transforming them into zombie agents.

c. Overwhelm a target server with ACK packers exploiting the nature of the 3 way handshake.

d. Alter the MAC address of a computer’s ARP cache so that traffic is directed to a man-in-the-middle instead of the intended destination such as an internet router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is TRUE with regards to the SMURF Flood attack

a. The attacker utilizes large volumes of SYN packets in order to flood the server.

b. The attacker sends an ARP broadcast packet in order to flood the server with ACK packets.

c. With the help of other computers, the attacker floods the server with ping requests.

d. With the help of other computers, the attacker floods the server with ping replies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following elements is most likely to be an issue for Ping flood?

a. Confidentiality

b. Integrity

c. Availability

d. Non-repudiation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following is a technique to mask the source IP address of a network attack?

a. DDoS

b. Replay

c. Sniffing

d. Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following malware is MOST LIKELY used by attackers to carry out Distributed Denial of Services (DDOS) attacks?

a. Trojan.

b. Rootkit

c. Botnet.

d. Adware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statement about IP spoofing is TRUE?

a. The destination IP address of the network packet is changed to another IP address.

b. The source MAC address of the network packet is changed to the hacker’s MAC address.

c. The destination MAC address of the network packet is changed to the hacker’s MAC address.

d. The source IP address of the network packet is changed to another IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes differential backup?

A. A differential backup backs up all the information on the disk to an offline device such as tape.

B. A differential backup backs up only the information that is added since previous differential backup.

C. A differential backup backs up only the information that is added since last full backup.

D. A differential backup backs up only the information that is added since last incremental backup.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?