Passive attack quiz

Passive attack quiz

University

15 Qs

quiz-placeholder

Similar activities

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

Target

Target

University

16 Qs

Device Hardening

Device Hardening

University

20 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Unit 3 - 2.4.8 DoS & DDoS

Unit 3 - 2.4.8 DoS & DDoS

9th Grade - University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Passive attack quiz

Passive attack quiz

Assessment

Quiz

Computers

University

Medium

Created by

Roshinyharidharan haridharan

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a __________the eavesdropper analyzes the traffic, determines the location, identifies communicating hosts and observes the frequency and length of exchanged messages.

modification of messages

session replay

traffic analysis

denial of service

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The only way to guarantee visibility of encrypted traffic for your security tools is to__________ the traffic before analyzing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The __________ is to gain information about the target and no data is changed.

bruteforce attack

passive attack

message modification

active attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For a release of message content, a telephonic conversation, an E-mail message or a transferred file may contain ________________

Integrated data

confidential data

data with access control

restricted data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A passive attack monitors the contents of the transmitted data.

true

false

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

true

false

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

In traffic analysis the opponent can only___________ which is encrypted.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?