A2 Computer Network-based Threats

A2 Computer Network-based Threats

12th Grade

11 Qs

quiz-placeholder

Similar activities

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Network Attacks

Network Attacks

9th - 12th Grade

15 Qs

SISTEM KEAMANAN JARINGAN

SISTEM KEAMANAN JARINGAN

12th Grade

15 Qs

Crash Course Computer Science #23 - Screens & 2D Graphics

Crash Course Computer Science #23 - Screens & 2D Graphics

9th - 12th Grade

16 Qs

Nmap Options, Host Discovery, and Port Scanning

Nmap Options, Host Discovery, and Port Scanning

6th Grade - University

16 Qs

Latihan ASJ Kelas XII SKJ

Latihan ASJ Kelas XII SKJ

12th Grade

10 Qs

Malware Quiz

Malware Quiz

KG - University

15 Qs

Module 10-LAN Security

Module 10-LAN Security

9th Grade - University

9 Qs

A2 Computer Network-based Threats

A2 Computer Network-based Threats

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Barry Wright

Used 14+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "achieved either through the placement of a monitoring device informally known as a bug on the wire in question or through built-in mechanisms in other communication technologies?"

Wiretapping

Port Scanning

Idle Scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "is a method of determining which ports on a network are open and could be receiving or sending data?"

Wiretapping

Port Scanning

Idle Scanning

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is "a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is accomplished by impersonating another computer whose network traffic is very slow or nonexistent (that is, not transmitting or receiving information)?"

Wiretapping

Port Scanning

Idle Scanning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "is an attack meant to shut down a machine or network, making it inaccessible to its intended users?"

Denial-of-Service

Spoofing

Man in the Middle

Address Resolution Protocol (ARP) Poisoning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage?"

Denial-of-Service

Spoofing

Man in the Middle

Address Resolution Protocol (ARP) Poisoning

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What "is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties?"

Denial-of-Service

Spoofing

Man in the Middle

Address Resolution Protocol (ARP) Poisoning

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What "is a type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table?"

Denial-of-Service

Spoofing

Man in the Middle

Address Resolution Protocol (ARP) Poisoning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?