Search Header Logo

Networks and Security: Quiz 11

Authored by John Coder

Computers

Professional Development

Networks and Security: Quiz 11
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A back_________ attack is another type of attack you will need to be aware of as a security analyst. An organization may have a lot of security measures in place, including cameras, biometric scans and access codes to keep employees from entering and exiting without being seen. However, an employee might work around the security measures by finding a back_________ to the building that is not as heavily monitored, allowing them to sneak out for the afternoon without being seen. 

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a de_________ of se_________ (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks. A DoS attack is an attack that targets a network or server and flo_________ it with network traf_________ .

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • financial: When a system is taken offline with a DoS attack, or business operations are halted or slowed down by some other tactic, they prevent a company from performing the tasks that generate rev_________. Depending on the size of an organization, interrupted operations can cost millions of dollars. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • pu_________________ safety: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a pu_________________ water system, or even a military defense communication system, the pu_________________ could face physical harm due to a network intrusion attack.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • rep____________: Attacks can also have a negative impact on the rep____________ of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The objective of a denial of service attack, or a DoS attack, is to disrupt normal business operations by over_____________ an organization's network. The goal of the attack is to send so much information to a network device that it crashes or is unable to respond to legitimate users. This means that the organization won't be able to conduct their normal business operations, which can cost them money and time. A network crash can also leave them vulnerable to other security threats and attacks.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A distr____________ denial of service attack, or DDoS, is a kind of DoS attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic. Use of numerous devices makes it more likely that the total amount of traffic sent will overwhelm the target server. Remember, DoS stands for denial of service. So it doesn't matter what part of the network the attacker overloads; if they overload anything, they win. An unfortunate example I've seen is an attacker who crafted a very careful packet that caused a router to spend extra time processing the request. The overall traffic volume didn't overload the router; the specifics within the packet did.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?