
TCP/IP Protocol Vulnerabilities
Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Iloxene Ulysse
FREE Resource
Enhance your content in a minute
4 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which type of attack substitutes a secure IP address to impersonate a legitimate a computer system?
ARP Spoofing
IP Spoofing
Buffer overflow
Man-in-the-middle
2.
MATCH QUESTION
1 min • 1 pt
Arp Spoofing
Threat actors try to overwhelm the target system by echo request packets.
Ping
Threat actors alter IP packets with false source IP addresses that impersonate another computer system.
IP Spoofing
Threat actors send false ARP messages to pass a MAC (media access control) address off as a legitimate IP address within the network.
TCP sequence prediction
Threat actors use malware to identify open and closed ports on internet-connected devices.
Port Scanning
Threat actors try to predict TCP sequences to imitate the original sender and insert false and malicious packets.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what happens during a source route attack
Threat actors try to spoof the source IP address of a client and redirect their system to send the same data repeatedly to a targeted server with a malicious payload.
Threat actors gain access to the source path and modify the options in the route for a data packet to take.
Threat actors try to create a flood of half-opened sessions awaiting replies that will not come and thus deny any new connections on the target computer.
Threat actors try to guess the sequence of numbers that TCP assigns to a stream of data packets for malicious intent.
4.
DROPDOWN QUESTION
1 min • 1 pt
In a (a) attack, threat actors will spoof the source address of the ICMP packet and send a broadcast to all computers on that network to generate enough broadcast traffic to compromise the network.
(b) _____ is a technique used to exploit the vulnerability in the ICMP echo packet to obtain details of the operating system on the target computer.
A(n) (c) attack is when threat actors exploit overlapping IP fragments present in the target system. When the destination target tries to reassemble them, it cannot do so and fails, which causes the target system to reboot or crash.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
9 questions
TLAC Summary: 1. The Prison Break
Quiz
•
12th Grade
8 questions
Basic Concept of Computer
Quiz
•
9th Grade
8 questions
Scratch
Quiz
•
1st - 12th Grade
8 questions
Icebreaker 1
Quiz
•
9th - 12th Grade
8 questions
Computer Game Design
Quiz
•
9th - 12th Grade
8 questions
Fun Stuff Minecraft
Quiz
•
KG - Professional Dev...
9 questions
Digitalna pismenost
Quiz
•
9th Grade
9 questions
Intro to Web Design
Quiz
•
10th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
