
CyberOps Modules 24-25
Authored by Logan Prewitt
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
1. Which ICMP message type should be stopped inbound?
source quench
echo-reply
echo
unreachable
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
2. How can IMAP be a security threat to a company?
Someone inadvertently clicks on a hidden iFrame.
Encrypted data is decrypted.
An email can be used to bring malware to a host.
It can be used to encode stolen data and send to a threat actor.
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
3. Which two technologies are primarily used on peer-to-peer networks? (Choose two.)
Bitcoin
BitTorrent
Wireshark
Darknet
Snort
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
4. Which protocol is exploited by cybercriminals who create malicious iFrames?
HTTP
ARP
DHCP
DNS
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
5. Which method is used by some malware to transfer files from infected hosts to a threat actor host?
UDP infiltration
ICMP tunneling
HTTPS traffic encryption
iFrame injection
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
6. Why does HTTPS technology add complexity to network security monitoring?
HTTPS dynamically changes the port number on the web server.
HTTPS uses tunneling technology for confidentiality.
HTTPS hides the true source IP address using NAT/PAT.
HTTPS conceals data traffic through end-to-end encryption.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which approach is intended to prevent exploits that target syslog?
Use a Linux-based server.
Use syslog-ng.
Create an ACL that permits only TCP traffic to the syslog server.
Use a VPN between a syslog client and the syslog server.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
PHP Programming - Assessment
Quiz
•
9th - 12th Grade
40 questions
PAS MAPEL AIJ KELAS XII TKJ
Quiz
•
12th Grade
30 questions
D&T Challenge 1
Quiz
•
9th - 12th Grade
40 questions
[SMP-IX] ASAS 2024 Ganjil
Quiz
•
9th Grade - University
40 questions
PRE TEST_OS_MIDTERMS
Quiz
•
12th Grade
35 questions
Latihan SAS Gasal Informatika TA 23/24
Quiz
•
9th - 12th Grade
31 questions
Simulasi Digital
Quiz
•
9th - 12th Grade
30 questions
REDES I-Tipo de redes y topología 2024
Quiz
•
1st - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade