TCP/IP Protocol Vulnerabilities

TCP/IP Protocol Vulnerabilities

9th - 12th Grade

4 Qs

quiz-placeholder

Similar activities

Exploring Pokémon Violet's Gameplay Features

Exploring Pokémon Violet's Gameplay Features

10th Grade

8 Qs

(Intermediate) Week 8: Sending Messages

(Intermediate) Week 8: Sending Messages

KG - University

8 Qs

Quiz komputer

Quiz komputer

8th - 9th Grade

7 Qs

html image quiz

html image quiz

11th Grade

6 Qs

PrerequisteTest

PrerequisteTest

4th Grade - University

7 Qs

Minecraft

Minecraft

KG - University

7 Qs

The cloud

The cloud

7th - 10th Grade

9 Qs

Lesson 2: Arduino Basics

Lesson 2: Arduino Basics

9th - 12th Grade

7 Qs

TCP/IP Protocol Vulnerabilities

TCP/IP Protocol Vulnerabilities

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Iloxene Ulysse

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

4 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which type of attack substitutes a secure IP address to impersonate a legitimate a computer system?

ARP Spoofing

IP Spoofing

Buffer overflow

Man-in-the-middle

2.

MATCH QUESTION

1 min • 1 pt


Arp Spoofing

Threat actors try to overwhelm the target system by echo request packets.

Ping

Threat actors alter IP packets with false source IP addresses that impersonate another computer system.

IP Spoofing

Threat actors send false ARP messages to pass a MAC (media access control) address off as a legitimate IP address within the network.

TCP sequence prediction

Threat actors use malware to identify open and closed ports on internet-connected devices.

Port Scanning

Threat actors try to predict TCP sequences to imitate the original sender and insert false and malicious packets.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what happens during a source route attack

Threat actors try to spoof the source IP address of a client and redirect their system to send the same data repeatedly to a targeted server with a malicious payload.

Threat actors gain access to the source path and modify the options in the route for a data packet to take.

Threat actors try to create a flood of half-opened sessions awaiting replies that will not come and thus deny any new connections on the target computer.

Threat actors try to guess the sequence of numbers that TCP assigns to a stream of data packets for malicious intent.

4.

DROPDOWN QUESTION

1 min • 1 pt

In a ​ (a)   attack, threat actors will spoof the source address of the ICMP packet and send a broadcast to all computers on that network to generate enough broadcast traffic to compromise the network.

​ (b)   _____ is a technique used to exploit the vulnerability in the ICMP echo packet to obtain details of the operating system on the target computer.

A(n) ​ ​ ​ (c)   attack is when threat actors exploit overlapping IP fragments present in the target system. When the destination target tries to reassemble them, it cannot do so and fails, which causes the target system to reboot or crash.

Smurf
FingerPrinting
Teardrop
ICMP Tunnel
Finger printing
smurf

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?