Sec+ Review

Sec+ Review

10th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Berpikir Komputasional

Berpikir Komputasional

10th Grade

20 Qs

Remedial PH 1 AIJ XII

Remedial PH 1 AIJ XII

12th Grade

20 Qs

Asesment technopreneur dkv

Asesment technopreneur dkv

10th Grade

20 Qs

python lists

python lists

10th Grade

20 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

2021.10.15_ Đề kiểm tra tin học 12

2021.10.15_ Đề kiểm tra tin học 12

12th Grade

20 Qs

3.8  Mengevaluasi Perangkat Eksternal / Peripheral (SisKom)

3.8 Mengevaluasi Perangkat Eksternal / Peripheral (SisKom)

10th Grade

20 Qs

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

12th Grade

20 Qs

Sec+ Review

Sec+ Review

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Linda Lavender

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What attack does this image represent?

Man-In-The-Middle Attack

Baiting Attack

Spoof Attack

Hijack Attack

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker takes over a session between you and another person then disconnects the other person from communication. The other person still believes they are talking to you.

Hijack Attack

In-Between-Attack

Baiting

Spoof Attack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that sends enough requests to overload a resource or even stopping its operation.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A type of attack that randomly opens TCP ports at the source of the attack and ties up the computer with a large amount of false SYN requests.

Denial of Service (DoS)
Distributed DoS (DDoS)
SYN Flood 
Spoofing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the data transmissions are intercepted and recorded by an attacker, then replayed to gain access. This attack is called:

Man-in-the-Middle
Replay
SYN Flood 
Spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When the attack changes the DNS records to point to imposter servers. This attack is called:

Man-in-the-Middle
Replay
DNS Poisoning 
Spoofing

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.

A social engineer 
Man-in-the-Middle
A Haker
IT Technician 

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?