CCNA Chapitre 16

CCNA Chapitre 16

Professional Development

21 Qs

quiz-placeholder

Similar activities

Day 4 - Security I - Day 4 Review - 2nd Review

Day 4 - Security I - Day 4 Review - 2nd Review

Professional Development

17 Qs

Salesforce Developer

Salesforce Developer

Professional Development

20 Qs

PSSE Icebreaker

PSSE Icebreaker

University - Professional Development

20 Qs

Asas JavaScript 2

Asas JavaScript 2

Professional Development

18 Qs

TS AUS Day 3 Knowledge Check

TS AUS Day 3 Knowledge Check

Professional Development

20 Qs

Network+ 20q

Network+ 20q

Professional Development

20 Qs

SUSE Cloud Native Quiz: Finale

SUSE Cloud Native Quiz: Finale

Professional Development

18 Qs

Protecting Host Systems

Protecting Host Systems

11th Grade - Professional Development

16 Qs

CCNA Chapitre 16

CCNA Chapitre 16

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Hakuma 29

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S web server. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of “file” and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George’s workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah’s computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?

Access Attack
DoS Attack
Malware Attack
Reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

Data Loss / Manipulation
DoS Attack
Identity Theft
Information Theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?