ARP Spoofing, SSL & DMZ

ARP Spoofing, SSL & DMZ

University

8 Qs

quiz-placeholder

Similar activities

Network+ Computer Network Fundamentals

Network+ Computer Network Fundamentals

University

10 Qs

La criptografía y la infraestructura de claves públicas

La criptografía y la infraestructura de claves públicas

University

10 Qs

Hackers point

Hackers point

University

8 Qs

Computer Networks

Computer Networks

University

13 Qs

ISRC CyberTrivia

ISRC CyberTrivia

University

12 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

Module 8 (Fundamentals of Cybersecurity_

Module 8 (Fundamentals of Cybersecurity_

University

10 Qs

Module 11: Switch Security Configuration

Module 11: Switch Security Configuration

University

10 Qs

ARP Spoofing, SSL & DMZ

ARP Spoofing, SSL & DMZ

Assessment

Quiz

Computers

University

Hard

Created by

Thalita Vergilio

Used 11+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

This protocol is used to resolve MAC addresses against IP addresses.

SSH

ARP

FTP

SSL

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

ARP spoofing is a technique commonly used to perform which type of attack?

brute-force

phishing

man-in-the-middle

SQL injection

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

SSL/TLS communication is...

encrypted

unencrypted

unilateral

client-side only

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which process is depicted in the image?

HTTP request/response

a firewall filtering packets

ARP request/response

SSL/TLS handshake

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which attack is shown in the picture?

DoS

ARP poisoning

phishing

botnet

6.

MULTIPLE CHOICE QUESTION

10 sec • Ungraded

I have completed the module feedback

Yes

No

Not yet, but planning to after the quiz 😉

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is typically deployed in the DMZ?

databases containing sensitive data

web servers

8.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is shown in the picture?

man-in-the-middle attack

public key infrastructure

ARP poisoning

DMZ