CyberOps Modules 24-25

CyberOps Modules 24-25

12th Grade

35 Qs

quiz-placeholder

Similar activities

Setting up a network server

Setting up a network server

9th - 12th Grade

30 Qs

QUIZ: HOW THE INTERNET WORKS

QUIZ: HOW THE INTERNET WORKS

9th - 12th Grade

40 Qs

UTS Genap X TJKT

UTS Genap X TJKT

9th - 12th Grade

30 Qs

DNS & AD

DNS & AD

11th - 12th Grade

30 Qs

The Internet

The Internet

7th - 12th Grade

31 Qs

UAS Administrasi Sistem Jaringan

UAS Administrasi Sistem Jaringan

12th Grade

40 Qs

Administrasi Infrastruktur Jaringan (Firewall)

Administrasi Infrastruktur Jaringan (Firewall)

12th Grade

40 Qs

MidTerm:  Intro to Cybersecurity

MidTerm: Intro to Cybersecurity

12th Grade

34 Qs

CyberOps Modules 24-25

CyberOps Modules 24-25

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Logan Prewitt

Used 5+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. Which ICMP message type should be stopped inbound?

  • source quench

  • echo-reply

echo

  • unreachable

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. How can IMAP be a security threat to a company?

  • Someone inadvertently clicks on a hidden iFrame.

  • Encrypted data is decrypted.

An email can be used to bring malware to a host.

  • It can be used to encode stolen data and send to a threat actor.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. Which two technologies are primarily used on peer-to-peer networks? (Choose two.)


Bitcoin

BitTorrent

  • Wireshark

  • Darknet

  • Snort

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which protocol is exploited by cybercriminals who create malicious iFrames?


HTTP

  • ARP

  • DHCP

  • DNS

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration

ICMP tunneling

  • HTTPS traffic encryption

  • iFrame injection

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. Why does HTTPS technology add complexity to network security monitoring?

  • HTTPS dynamically changes the port number on the web server.

  • HTTPS uses tunneling technology for confidentiality.

  • HTTPS hides the true source IP address using NAT/PAT.

HTTPS conceals data traffic through end-to-end encryption.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7. Which approach is intended to prevent exploits that target syslog?

  • Use a Linux-based server.

Use syslog-ng.

  • Create an ACL that permits only TCP traffic to the syslog server.

  • Use a VPN between a syslog client and the syslog server.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?