
Means of attack No 1
Authored by Elizabeth Gist
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves flooding a network or server with excessive traffic to disrupt normal operation?
Phishing
DDoS
Spoofing
Malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves tricking users into providing sensitive information such as passwords or credit card details?
DDoS
Spoofing
Phishing
Ransomware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves intercepting and altering communication between two parties without their knowledge?
Man-in-the-Middle (MitM)
DDoS
SQL Injection
Brute Force
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack aims to overwhelm a computer system by exploiting vulnerabilities in its software?
DDoS
Phishing
Buffer Overflow
Spoofing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What attack involves flooding a target with packets containing IP addresses of nonexistent systems?
Ping of Death
Smurf Attack
SYN Flood
DNS Spoofing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack injects malicious SQL code into input fields to manipulate or access a database?
Buffer Overflow
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle (MitM)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves sending unsolicited emails with malicious attachments or links?
Phishing
DDoS
Spoofing
Ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?