CyberFundamentals Chap3

CyberFundamentals Chap3

University

11 Qs

quiz-placeholder

Similar activities

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Module 9-Address Resolution Protocol

Module 9-Address Resolution Protocol

9th Grade - Professional Development

10 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

Types of Attack

Types of Attack

University

10 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

CyberCrime

CyberCrime

5th Grade - Professional Development

10 Qs

CHAPTER 4: IDS AND IPS

CHAPTER 4: IDS AND IPS

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

CyberFundamentals Chap3

CyberFundamentals Chap3

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Monarjay Malbog

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks exploit weaknesses in the program such as not validating database queries properly.

Cross-site scripting

Code Injections Attacks

Buffer Overflow

Remote Code Executions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security protocol that attempted to provide a wireless local area network (WLAN) with the same level of security as a wired LAN.

Wired Equivalent Privacy

Rogue Access Points

Cross-site scripting

Denial-of-Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An impersonation attack.

Denial-of-Service (DoS) Attacks

Man-in-the-middle

Spoofing

Sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software program that records or logs the keystrokes of the user of the system.

SMiShing

Grayware

Zero-Day Attacks

Keyboard Logging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack similar to eavesdropping on someone.

Spoofing

Sniffing

Man-in-the-middle

Denial-of-Service (DoS) Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to manipulate individuals into performing actions or divulging confidential information.

Social Engineering

 Tailgating

Impersonation

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Occurs when a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

Piggybacking and Tailgating

Shoulder Surfing and Dumpster Diving

Impersonation and Hoaxes

Online, Email, and Web-based Trickery

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?