CyberFundamentals Chap3

CyberFundamentals Chap3

University

11 Qs

quiz-placeholder

Similar activities

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Type of Attacks

Type of Attacks

University

9 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Quiz prima lezione Gioia Tauro

Quiz prima lezione Gioia Tauro

University

11 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Tema 4 - SI

Tema 4 - SI

University

10 Qs

CyberFundamentals Chap3

CyberFundamentals Chap3

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 7+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks exploit weaknesses in the program such as not validating database queries properly.

Cross-site scripting

Code Injections Attacks

Buffer Overflow

Remote Code Executions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security protocol that attempted to provide a wireless local area network (WLAN) with the same level of security as a wired LAN.

Wired Equivalent Privacy

Rogue Access Points

Cross-site scripting

Denial-of-Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An impersonation attack.

Denial-of-Service (DoS) Attacks

Man-in-the-middle

Spoofing

Sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software program that records or logs the keystrokes of the user of the system.

SMiShing

Grayware

Zero-Day Attacks

Keyboard Logging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack similar to eavesdropping on someone.

Spoofing

Sniffing

Man-in-the-middle

Denial-of-Service (DoS) Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to manipulate individuals into performing actions or divulging confidential information.

Social Engineering

 Tailgating

Impersonation

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Occurs when a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

Piggybacking and Tailgating

Shoulder Surfing and Dumpster Diving

Impersonation and Hoaxes

Online, Email, and Web-based Trickery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?