Quiz - Lesson 1 A - Secure Network Operations Protocol

Quiz - Lesson 1 A - Secure Network Operations Protocol

Professional Development

10 Qs

quiz-placeholder

Similar activities

MODULO LAN

MODULO LAN

Professional Development

15 Qs

Toxidrome

Toxidrome

Professional Development

9 Qs

PORT NUMBERS

PORT NUMBERS

Professional Development

15 Qs

KUIZ 1 LATIHAN PENGENDALI MAKANAN THAMES OXFORD ACADEMY

KUIZ 1 LATIHAN PENGENDALI MAKANAN THAMES OXFORD ACADEMY

Professional Development

5 Qs

Food Safety

Food Safety

Professional Development

10 Qs

Food-Borne Diseases

Food-Borne Diseases

KG - Professional Development

10 Qs

Openings (other)

Openings (other)

KG - Professional Development

9 Qs

Null ahm

Null ahm

Professional Development

15 Qs

Quiz - Lesson 1 A - Secure Network Operations Protocol

Quiz - Lesson 1 A - Secure Network Operations Protocol

Assessment

Quiz

Other

Professional Development

Medium

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these secure protocols would be used for synchronizing clocks on network infrastructure devices?

NTPv3

SNMPv3

SFTP

HTTPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are no protections against DoS/DDoS attacks.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNSSEC protects users from DNS attacks and forces systems to detect DNS attacks.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ adds a layer of trust on top of DNS by providing authentication while the roots DNS name servers help verify the domain.

DHCP

SSH

DNSSEC

TCP/IP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination.

DNS poisoning

Man in the Middle

Rouge

Domain Hijacking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ is an attack where an organization's web address is stolen by another party.

Domain Hijacking

DNS Poisoning

Denial of Service

ICMP attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ attack is a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer.

DNS spoofing

Cache poisoning

Man-in-the-Middle

Ping of death

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?