CyberFundamentals Chap3

CyberFundamentals Chap3

University

11 Qs

quiz-placeholder

Similar activities

Type of Attacks

Type of Attacks

University

9 Qs

Session and Spoofing

Session and Spoofing

University

10 Qs

Switch Security Configuration

Switch Security Configuration

University

10 Qs

Chapters 8 and 9

Chapters 8 and 9

University

12 Qs

Chapter 10 - quiz in-class

Chapter 10 - quiz in-class

University

12 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Cuestionario Seguridad Dispositivos Capa 2

Cuestionario Seguridad Dispositivos Capa 2

University

10 Qs

CyberFundamentals Chap3

CyberFundamentals Chap3

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 7+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks exploit weaknesses in the program such as not validating database queries properly.

Cross-site scripting

Code Injections Attacks

Buffer Overflow

Remote Code Executions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security protocol that attempted to provide a wireless local area network (WLAN) with the same level of security as a wired LAN.

Wired Equivalent Privacy

Rogue Access Points

Cross-site scripting

Denial-of-Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An impersonation attack.

Denial-of-Service (DoS) Attacks

Man-in-the-middle

Spoofing

Sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software program that records or logs the keystrokes of the user of the system.

SMiShing

Grayware

Zero-Day Attacks

Keyboard Logging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack similar to eavesdropping on someone.

Spoofing

Sniffing

Man-in-the-middle

Denial-of-Service (DoS) Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to manipulate individuals into performing actions or divulging confidential information.

Social Engineering

 Tailgating

Impersonation

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Occurs when a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

Piggybacking and Tailgating

Shoulder Surfing and Dumpster Diving

Impersonation and Hoaxes

Online, Email, and Web-based Trickery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?