Networks and Security: Quiz 11

Networks and Security: Quiz 11

Professional Development

19 Qs

quiz-placeholder

Similar activities

Part 3.2

Part 3.2

Professional Development

20 Qs

Intro to Cybersecurity - Review 1

Intro to Cybersecurity - Review 1

Professional Development

20 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

Class Test-5

Class Test-5

Professional Development

15 Qs

MTCNA Pretest 2

MTCNA Pretest 2

Professional Development

22 Qs

Part 4.2

Part 4.2

Professional Development

20 Qs

securing networks (Cont.FTP,telnet, etc)

securing networks (Cont.FTP,telnet, etc)

Professional Development

20 Qs

Networks and Security: Quiz 11

Networks and Security: Quiz 11

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

19 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A back_________ attack is another type of attack you will need to be aware of as a security analyst. An organization may have a lot of security measures in place, including cameras, biometric scans and access codes to keep employees from entering and exiting without being seen. However, an employee might work around the security measures by finding a back_________ to the building that is not as heavily monitored, allowing them to sneak out for the afternoon without being seen. 

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a de_________ of se_________ (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks. A DoS attack is an attack that targets a network or server and flo_________ it with network traf_________ .

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • financial: When a system is taken offline with a DoS attack, or business operations are halted or slowed down by some other tactic, they prevent a company from performing the tasks that generate rev_________. Depending on the size of an organization, interrupted operations can cost millions of dollars. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • pu_________________ safety: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a pu_________________ water system, or even a military defense communication system, the pu_________________ could face physical harm due to a network intrusion attack.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • rep____________: Attacks can also have a negative impact on the rep____________ of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The objective of a denial of service attack, or a DoS attack, is to disrupt normal business operations by over_____________ an organization's network. The goal of the attack is to send so much information to a network device that it crashes or is unable to respond to legitimate users. This means that the organization won't be able to conduct their normal business operations, which can cost them money and time. A network crash can also leave them vulnerable to other security threats and attacks.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A distr____________ denial of service attack, or DDoS, is a kind of DoS attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic. Use of numerous devices makes it more likely that the total amount of traffic sent will overwhelm the target server. Remember, DoS stands for denial of service. So it doesn't matter what part of the network the attacker overloads; if they overload anything, they win. An unfortunate example I've seen is an attacker who crafted a very careful packet that caused a router to spend extra time processing the request. The overall traffic volume didn't overload the router; the specifics within the packet did.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?