
Types of Attack
Authored by Wahyu Adi Prabowo
Computers
University
Used 31+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The most common session-hijacking is man in the middle attack
True
False
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following best describes session hacking
Taking over a target machine via a trojan horse
taking control of the login session
Taking Control of the communication link between two machines.
Taking control of a target machine remotely
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Smurf attack is a popular DoS attack
True
False
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the danger inherent in IP spoofing attacks?
Many firewalls do not examine packets that seems to come from within the network
There are very damaging to target systems
Many of these attacks open the door for other attacks
they can be difficult to stop
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
To be protected against Ping of death attacks ensure that all operating systems are patched
True
False
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is the best defnition for IP spoofing?
Rerouting packets to a different IP addess
Setting up a fake website that appears to be a different site
sending packets that are misconfigured
Sending a packet to be appears to come from a trusted IP address
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A _____ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle.
MiTM attack
Phishing attack
Website attack
DoS attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?