Network Attacks and Security

Network Attacks and Security

11th - 12th Grade

12 Qs

quiz-placeholder

Similar activities

Unit 4, AOS 2 2020

Unit 4, AOS 2 2020

11th - 12th Grade

14 Qs

Modality

Modality

11th - 12th Grade

11 Qs

IDIOMS ABOUT EDUCATION

IDIOMS ABOUT EDUCATION

6th - 11th Grade

13 Qs

Thanksgiving

Thanksgiving

9th - 12th Grade

10 Qs

Captain Nobody (Ch7-8)

Captain Nobody (Ch7-8)

9th - 12th Grade

10 Qs

SDG Intro Test

SDG Intro Test

12th Grade

10 Qs

Republic Day Quiz

Republic Day Quiz

KG - 12th Grade

10 Qs

What do you know about cults?

What do you know about cults?

11th Grade

17 Qs

Network Attacks and Security

Network Attacks and Security

Assessment

Quiz

Education

11th - 12th Grade

Practice Problem

Medium

Created by

Hy Fernz

Used 58+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. ARP poisoning is a technique used to:

a. Overwhelm a target server with ICMP ping packers causing a DOS attack.

b. Install malware on victim machines transforming them into zombie agents.

c. Overwhelm a target server with ACK packers exploiting the nature of the 3 way handshake.

d. Alter the MAC address of a computer’s ARP cache so that traffic is directed to a man-in-the-middle instead of the intended destination such as an internet router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is TRUE with regards to the SMURF Flood attack

a. The attacker utilizes large volumes of SYN packets in order to flood the server.

b. The attacker sends an ARP broadcast packet in order to flood the server with ACK packets.

c. With the help of other computers, the attacker floods the server with ping requests.

d. With the help of other computers, the attacker floods the server with ping replies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following elements is most likely to be an issue for Ping flood?

a. Confidentiality

b. Integrity

c. Availability

d. Non-repudiation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following is a technique to mask the source IP address of a network attack?

a. DDoS

b. Replay

c. Sniffing

d. Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following malware is MOST LIKELY used by attackers to carry out Distributed Denial of Services (DDOS) attacks?

a. Trojan.

b. Rootkit

c. Botnet.

d. Adware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statement about IP spoofing is TRUE?

a. The destination IP address of the network packet is changed to another IP address.

b. The source MAC address of the network packet is changed to the hacker’s MAC address.

c. The destination MAC address of the network packet is changed to the hacker’s MAC address.

d. The source IP address of the network packet is changed to another IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes differential backup?

A. A differential backup backs up all the information on the disk to an offline device such as tape.

B. A differential backup backs up only the information that is added since previous differential backup.

C. A differential backup backs up only the information that is added since last full backup.

D. A differential backup backs up only the information that is added since last incremental backup.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?