Search Header Logo

Passive attack quiz

Authored by Roshinyharidharan haridharan

Computers

University

Used 8+ times

Passive attack quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a __________the eavesdropper analyzes the traffic, determines the location, identifies communicating hosts and observes the frequency and length of exchanged messages.

modification of messages

session replay

traffic analysis

denial of service

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The only way to guarantee visibility of encrypted traffic for your security tools is to__________ the traffic before analyzing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The __________ is to gain information about the target and no data is changed.

bruteforce attack

passive attack

message modification

active attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For a release of message content, a telephonic conversation, an E-mail message or a transferred file may contain ________________

Integrated data

confidential data

data with access control

restricted data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A passive attack monitors the contents of the transmitted data.

true

false

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

true

false

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In traffic analysis the opponent can only___________ which is encrypted.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?