Search Header Logo

blah

Authored by Shaun Matthews

Instructional Technology

University

Used 2+ times

blah
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 10 pts

What kind of threat is described when a threat actor overloads a network to deny other users network access?​ ​ (a)  

Disruption of service
Data loss
Manipulation
Identity theft
Information theft

2.

CATEGORIZE QUESTION

3 mins • 20 pts

Place the terms under the correct category heading

Groups:

(a) Worms

,

(b) Viruses

,

(c) Phishing

Usually uses fake email and / or website

able to exist and spread without host

software that masquerades as harmless

application but includes malware

Frequently used as umbrella term for many forms of malicious software

Exploit network-based vulnerabilities to spread

Code that attaches itself to host,

replicates and at some stage executes payload

At some stage deliver payload (often malicious code)

Attempt to trick victim into providing sensitive information

3.

DROPDOWN QUESTION

30 sec • 10 pts

SQL ​ (a)   attacks involve inserting anomalous text into web page input fields to alter ​ (b)   executed in the Database backend. Often used to circumvent authentication or access database records.

injection
SQL queries
Replacement
insertion
SQL commands

4.

DROPDOWN QUESTION

30 sec • 10 pts

Three primary principles and goals used in security are ​ (a)   , ​ ​ (b)   and ​ (c)  

Confidentiality
Integrity
Availability
Sensitive
Honesty
accessibility

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

AAA Server

ESA/WSA

IPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of attack may involve the use of tools such as nslookup and fping?

access attacks

worm attack

denial of service attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

TCP usage

authorization

connections via multiple VTY lines

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?