A back_________ attack is another type of attack you will need to be aware of as a security analyst. An organization may have a lot of security measures in place, including cameras, biometric scans and access codes to keep employees from entering and exiting without being seen. However, an employee might work around the security measures by finding a back_________ to the building that is not as heavily monitored, allowing them to sneak out for the afternoon without being seen.

Networks and Security: Quiz 11

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
19 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a de_________ of se_________ (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks. A DoS attack is an attack that targets a network or server and flo_________ it with network traf_________ .
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
financial: When a system is taken offline with a DoS attack, or business operations are halted or slowed down by some other tactic, they prevent a company from performing the tasks that generate rev_________. Depending on the size of an organization, interrupted operations can cost millions of dollars. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
pu_________________ safety: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a pu_________________ water system, or even a military defense communication system, the pu_________________ could face physical harm due to a network intrusion attack.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
rep____________: Attacks can also have a negative impact on the rep____________ of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The objective of a denial of service attack, or a DoS attack, is to disrupt normal business operations by over_____________ an organization's network. The goal of the attack is to send so much information to a network device that it crashes or is unable to respond to legitimate users. This means that the organization won't be able to conduct their normal business operations, which can cost them money and time. A network crash can also leave them vulnerable to other security threats and attacks.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A distr____________ denial of service attack, or DDoS, is a kind of DoS attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic. Use of numerous devices makes it more likely that the total amount of traffic sent will overwhelm the target server. Remember, DoS stands for denial of service. So it doesn't matter what part of the network the attacker overloads; if they overload anything, they win. An unfortunate example I've seen is an attacker who crafted a very careful packet that caused a router to spend extra time processing the request. The overall traffic volume didn't overload the router; the specifics within the packet did.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz
•
Professional Development
20 questions
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Quiz
•
Professional Development
15 questions
Denial of Service

Quiz
•
Professional Development
15 questions
N+ Post Assessment

Quiz
•
Professional Development
16 questions
A+ - 5C - Compare Protocols and Ports

Quiz
•
Professional Development
15 questions
CCNA - SRWE&ENSA - Cap9-12

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
20 questions
101-120

Quiz
•
Professional Development
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade