
TCP/IP Protocol Vulnerabilities
Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Iloxene Ulysse
FREE Resource
Enhance your content in a minute
4 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which type of attack substitutes a secure IP address to impersonate a legitimate a computer system?
ARP Spoofing
IP Spoofing
Buffer overflow
Man-in-the-middle
2.
MATCH QUESTION
1 min • 1 pt
Port Scanning
Threat actors try to predict TCP sequences to imitate the original sender and insert false and malicious packets.
IP Spoofing
Threat actors send false ARP messages to pass a MAC (media access control) address off as a legitimate IP address within the network.
TCP sequence prediction
Threat actors use malware to identify open and closed ports on internet-connected devices.
Ping
Threat actors alter IP packets with false source IP addresses that impersonate another computer system.
Arp Spoofing
Threat actors try to overwhelm the target system by echo request packets.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what happens during a source route attack
Threat actors try to spoof the source IP address of a client and redirect their system to send the same data repeatedly to a targeted server with a malicious payload.
Threat actors gain access to the source path and modify the options in the route for a data packet to take.
Threat actors try to create a flood of half-opened sessions awaiting replies that will not come and thus deny any new connections on the target computer.
Threat actors try to guess the sequence of numbers that TCP assigns to a stream of data packets for malicious intent.
4.
DROPDOWN QUESTION
1 min • 1 pt
In a (a) attack, threat actors will spoof the source address of the ICMP packet and send a broadcast to all computers on that network to generate enough broadcast traffic to compromise the network.
(b) _____ is a technique used to exploit the vulnerability in the ICMP echo packet to obtain details of the operating system on the target computer.
A(n) (c) attack is when threat actors exploit overlapping IP fragments present in the target system. When the destination target tries to reassemble them, it cannot do so and fails, which causes the target system to reboot or crash.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
8 questions
HARDWARE
Quiz
•
9th - 12th Grade
8 questions
HOW TO NAVIGATE THE LMS
Quiz
•
7th - 12th Grade
8 questions
Keyboard Keys Quiz
Quiz
•
1st Grade - University
6 questions
Quiz
•
5th Grade - University
8 questions
Fortnite Chapter 2 quiz
Quiz
•
4th Grade - University
9 questions
Object Oriented Programming
Quiz
•
11th Grade
9 questions
DBMS Quiz
Quiz
•
12th Grade
8 questions
Geospatial concepts 02 - coordinate systems
Quiz
•
5th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
