
Attacks/Encryptions/Regs CEH 2.5
Authored by Prem Jadhwani
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MATCH QUESTION
3 mins • 1 pt
Match the following attack types.
aLTEr Attack
Hacker intercepts communications between a user's web browser and a server and is able to decrypt the information.
Slowloris Attack
Attacker gains access to Hard Coded Keys used in a Random Number generator (RNG) and can use them to compromise communications.
DUHK Attack
An attacker making a computer talk to another computer very, very slow to draw out a conversation.
DROWN Attack
Leverages weaknesses in web servers that accepts deprecated SSL protocols, allowing an attacker to decrypt sensitive information.
POODLE Attack
Targets an LTE network and intercepting information between a mobile device and the network tower.
2.
MATCH QUESTION
3 mins • 1 pt
Match the following attack types:
Deauthentication Attack
an attacker uses a cryptographic attack that exploits information gained from padding errors in an encryption system.
DroidSheep
Attacker collects information by sending a deauthentication message that will cause a device to send a reauthentication request to a server.
Agent Smith Attack
A malicious software program that attempts to replicate itself onto other programs.
Padding Oracle Attack
Android application that is known for its use in demonstrating security vulnerabilities rather than for malicious purposes
Trident
A vulnerability that allows and attacker to jailbreak an IOS device and install Pegasus Software.
3.
MATCH QUESTION
3 mins • 1 pt
Match the following CVSS Scores.
0.1-3.9
Low
0.0-0.1
Medium
4.0-6.9
Critical
9.0-10.0
High
7.0-8.9
None
4.
MATCH QUESTION
3 mins • 1 pt
Match the following regulations.
PCI DSS
U.S. government program that standardizes the security assessment, authorization, and continuous monitoring processes for cloud products and services. It aims to ensure that cloud solutions used by federal agencies meet specific security standards.
GLBA
federal law that defines a comprehensive framework to protect government information, operations, and assets. requires Federal agencies to develop and maintain security programs.
FISMA
U.S. federal law enacted to enhance corporate governance and financial reporting transparency. It establishes requirements for financial reporting, internal controls, and the accountability of corporate officers to prevent fraudulent activities.
SOX
a set of security standards designed to ensure the secure handling of credit card information during transactions. It applies to organizations that process, store, or transmit credit card data and aims to prevent data breaches and theft of cardholder information.
FedRAMP
U.S. law that addresses the protection of consumers' personal financial information held by financial institutions. It requires institutions to establish privacy and security programs to safeguard sensitive financial data.
Answer explanation
FISMA (Federal Information Security Management Act)
HIPAA (Health Insurance Portability and Accountability Act)
SOX (Sarbanes-Oxley Act)
FedRAMP (Federal Risk and Authorization Management Program)
GLBA (Gramm-Leach-Bliley Act)
PCI DSS (Payment Card Industry Data Security Standard)
5.
CATEGORIZE QUESTION
3 mins • 1 pt
Match the following encryption types to the correct category.
Groups:
(a) Symmetric (1-Key)
,
(b) Asymmetric (2-Key)
,
(c) Hash
Serpent
SHA256
ECC
Whirlpool
RSA
DSA
3DES
AES
Blowfish
ECDSA
NTLM
Two Fish
Diffie Hellman
MD5
ECDH
Answer explanation
REDD fishES
RSA/DSA/ECC/DH - A
All fish/AES/DES/Serpent/CAST
6.
MATCH QUESTION
3 mins • 1 pt
Match the following attack types.
BlueSnarfing
attack that involves unauthorized access to a device's data, such as contacts, calendars, emails, and other stored information.
BlueBugging
exploits vulnerabilities in the Bluetooth protocol to gain control over the targeted device allowing unauthorized monitoring and control features.
BlueJacking
attacker sends unsolicited messages or business cards to Bluetooth-enabled devices within range, typically appearing as pop-up messages on a device.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
INTO Artificial Intelligence
Quiz
•
University - Professi...
10 questions
GUESS THAT WORD IN CYBER!
Quiz
•
Professional Development
10 questions
Let's Play Together
Quiz
•
University - Professi...
9 questions
Power BI Introduction and Connecting with Data Sources
Quiz
•
Professional Development
11 questions
BENGKEL PROMINO PT.2
Quiz
•
Professional Development
10 questions
Mobile Offline Sync - OutSystems
Quiz
•
Professional Development
10 questions
RabbitMQ Basic
Quiz
•
Professional Development
10 questions
CodeMonkey Platform Management & Resources
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development