
Module 2B. Active Reconnaissance - Enumeration
Authored by Sebastian Zamorano
Computers
University
Used 16+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the main reason why some protocols are not considered secure?
Subjected to malware
Only command-line option
IDS alerts
Plaintext traffic
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attacks is NOT facilitated by unencrypted traffic?
Sniffing attacks
Man in the Middle attacks
DOS attacks
Authentication attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an insecure protocol to connect to a virtual terminal on another computer?
FTP
Telnet
IMAP
SMTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an insecure protocol to transfer files between computers?
FTP
Telnet
IMAP
SMTP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an insecure protocol to upload email messages to Mail Transfer Agent servers?
FTP
Telnet
IMAP
SMTP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an insecure protocol to download email messages from Mail Delivery Agent servers?
FTP
Telnet
IMAP
SMTP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an insecure protocol to transfer web pages?
FTP
Telnet
HTTP
SMTP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?