blah

blah

University

7 Qs

Similar activities

PosTest

PosTest

University

7 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

TownsendC-wk3-ch4quizizz

TownsendC-wk3-ch4quizizz

University

10 Qs

ITMC232-ZT31Am PRE-TEST

ITMC232-ZT31Am PRE-TEST

University

10 Qs

Quiz 1 - Clase 02 - PRE UNIVO 22

Quiz 1 - Clase 02 - PRE UNIVO 22

University

10 Qs

ESL Vocabulary: Technology 1

ESL Vocabulary: Technology 1

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

12 Qs

TheNotebook Walkthrough

TheNotebook Walkthrough

University

5 Qs

blah

blah

Assessment

Quiz

Created by

Shaun Matthews

Instructional Technology

University

2 plays

Easy

7 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 10 pts

What kind of threat is described when a threat actor overloads a network to deny other users network access?​ ​ (a)  

Disruption of service
Data loss
Manipulation
Identity theft
Information theft

2.

CLASSIFICATION QUESTION

3 mins • 20 pts

Place the terms under the correct category heading

Groups:

(a) Worms

,

(b) Viruses

,

(c) Phishing

Frequently used as umbrella term for many forms of malicious software

Usually uses fake email and / or website

able to exist and spread without host

Code that attaches itself to host,

replicates and at some stage executes payload

At some stage deliver payload (often malicious code)

software that masquerades as harmless

application but includes malware

Exploit network-based vulnerabilities to spread

Attempt to trick victim into providing sensitive information

3.

DROPDOWN QUESTION

30 sec • 10 pts

SQL ​ (a)   attacks involve inserting anomalous text into web page input fields to alter ​ (b)   executed in the Database backend. Often used to circumvent authentication or access database records.

injection
SQL queries
Replacement
insertion
SQL commands

4.

DROPDOWN QUESTION

30 sec • 10 pts

Three primary principles and goals used in security are ​ (a)   , ​ ​ (b)   and ​ (c)  

Confidentiality
Integrity
Availability
Sensitive
Honesty
accessibility

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

AAA Server

ESA/WSA

IPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of attack may involve the use of tools such as nslookup and fping?

access attacks

worm attack

denial of service attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

TCP usage

authorization

connections via multiple VTY lines