ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

quiz-placeholder

Similar activities

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

ARP Spoofing, SSL & DMZ

ARP Spoofing, SSL & DMZ

University

8 Qs

DoS Attack Quiz

DoS Attack Quiz

University

10 Qs

Protokoły sieciowe

Protokoły sieciowe

1st Grade - University

12 Qs

Types of Attack

Types of Attack

University

10 Qs

Session and Spoofing

Session and Spoofing

University

10 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

Network Level Attack Quiz

Network Level Attack Quiz

University

10 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

Assessment

Quiz

Computers

University

Hard

Created by

Sreng Vichet

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a TCP/IP attack?

A cyber attack targeting the TCP/IP protocol suite

A software bug in the TCP/IP protocol

A physical attack on computer hardware

A marketing campaign for a new TCP/IP product

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves flooding a network with traffic to make it unavailable to its intended users?

Denial of Service (DoS) attack

Phishing attack

Malware attack

Spyware attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves intercepting communication between two parties to steal information?

Man-in-the-Middle

Behind-the-Back attack

Front-and-Center attack

Side-by-Side attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves sending a large number of connection requests to overwhelm a server's resources?

Ping of death attack

Man-in-the-middle attack

Phishing attack

SYN flood attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves modifying the source address in IP packets to hide the identity of the sender?

ARP spoofing

DNS spoofing

IP spoofing

MAC spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves exploiting vulnerabilities in the TCP/IP protocol stack to gain unauthorized access to a system?

DNS poisoning

Cross-site scripting

SQL injection

TCP/IP hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending fake ARP messages to associate the attacker's MAC address with the IP address of another host?

IP spoofing

ARP spoofing

MAC flooding

DNS poisoning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?