Quiz - Lesson 1 A - Secure Network Operations Protocol

Quiz - Lesson 1 A - Secure Network Operations Protocol

Professional Development

10 Qs

quiz-placeholder

Similar activities

BNHA quiz

BNHA quiz

KG - Professional Development

13 Qs

Guess the anime

Guess the anime

KG - Professional Development

6 Qs

Law Basics Review

Law Basics Review

Professional Development

15 Qs

Gabby Quiz

Gabby Quiz

Professional Development

11 Qs

Adivina el fotograma

Adivina el fotograma

Professional Development

15 Qs

Movies

Movies

Professional Development

12 Qs

ROBLOX

ROBLOX

KG - Professional Development

14 Qs

DRAGON BALL QUIZ

DRAGON BALL QUIZ

KG - Professional Development

11 Qs

Quiz - Lesson 1 A - Secure Network Operations Protocol

Quiz - Lesson 1 A - Secure Network Operations Protocol

Assessment

Quiz

Other

Professional Development

Practice Problem

Medium

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these secure protocols would be used for synchronizing clocks on network infrastructure devices?

NTPv3

SNMPv3

SFTP

HTTPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are no protections against DoS/DDoS attacks.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNSSEC protects users from DNS attacks and forces systems to detect DNS attacks.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ adds a layer of trust on top of DNS by providing authentication while the roots DNS name servers help verify the domain.

DHCP

SSH

DNSSEC

TCP/IP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination.

DNS poisoning

Man in the Middle

Rouge

Domain Hijacking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ is an attack where an organization's web address is stolen by another party.

Domain Hijacking

DNS Poisoning

Denial of Service

ICMP attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ attack is a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer.

DNS spoofing

Cache poisoning

Man-in-the-Middle

Ping of death

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?