ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

quiz-placeholder

Similar activities

Denial of Service Attacks

Denial of Service Attacks

University

10 Qs

DDoS

DDoS

University

10 Qs

Cyber Ark

Cyber Ark

University

15 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

Computer Networking Quiz

Computer Networking Quiz

University

10 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

Assessment

Quiz

Computers

University

Hard

Created by

Sreng Vichet

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a TCP/IP attack?

A cyber attack targeting the TCP/IP protocol suite

A software bug in the TCP/IP protocol

A physical attack on computer hardware

A marketing campaign for a new TCP/IP product

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves flooding a network with traffic to make it unavailable to its intended users?

Denial of Service (DoS) attack

Phishing attack

Malware attack

Spyware attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves intercepting communication between two parties to steal information?

Man-in-the-Middle

Behind-the-Back attack

Front-and-Center attack

Side-by-Side attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves sending a large number of connection requests to overwhelm a server's resources?

Ping of death attack

Man-in-the-middle attack

Phishing attack

SYN flood attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves modifying the source address in IP packets to hide the identity of the sender?

ARP spoofing

DNS spoofing

IP spoofing

MAC spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves exploiting vulnerabilities in the TCP/IP protocol stack to gain unauthorized access to a system?

DNS poisoning

Cross-site scripting

SQL injection

TCP/IP hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending fake ARP messages to associate the attacker's MAC address with the IP address of another host?

IP spoofing

ARP spoofing

MAC flooding

DNS poisoning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?