Sec+ Review

Sec+ Review

10th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

HBL 4P. 2Bto

HBL 4P. 2Bto

12th Grade

20 Qs

Kiểm tra TX1_Tin 11_KNTT

Kiểm tra TX1_Tin 11_KNTT

11th Grade

20 Qs

الوحدة 1- الشبكات السلكية واللاسلكية والانترنت -  حاسب 2

الوحدة 1- الشبكات السلكية واللاسلكية والانترنت - حاسب 2

10th - 12th Grade

20 Qs

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

Pengetahuan Dasar Komputer

Pengetahuan Dasar Komputer

9th - 12th Grade

20 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

Evaluación Primer Periodo Excel

Evaluación Primer Periodo Excel

10th Grade

20 Qs

Sec+ Review

Sec+ Review

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Linda Lavender

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What attack does this image represent?

Man-In-The-Middle Attack

Baiting Attack

Spoof Attack

Hijack Attack

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker takes over a session between you and another person then disconnects the other person from communication. The other person still believes they are talking to you.

Hijack Attack

In-Between-Attack

Baiting

Spoof Attack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that sends enough requests to overload a resource or even stopping its operation.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the data transmissions are intercepted and recorded by an attacker, then replayed to gain access. This attack is called:

Man-in-the-Middle
Replay
SYN Flood 
Spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the attack changes the DNS records to point to imposter servers. This attack is called:

Man-in-the-Middle
Replay
DNS Poisoning 
Spoofing

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.

A social engineer 
Man-in-the-Middle
A Haker
IT Technician 

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?