NSM-4

NSM-4

1st Grade

6 Qs

quiz-placeholder

Similar activities

servicedesk sharing session Quiz

servicedesk sharing session Quiz

1st - 2nd Grade

11 Qs

Computer 2 Review Test

Computer 2 Review Test

1st - 2nd Grade

10 Qs

Coding Quiz

Coding Quiz

1st - 3rd Grade

8 Qs

Grade-3 Computers

Grade-3 Computers

1st - 3rd Grade

10 Qs

Mid-term 1 quiz

Mid-term 1 quiz

1st Grade

10 Qs

SQL Quiz 2

SQL Quiz 2

KG - 1st Grade

10 Qs

What would you do if...

What would you do if...

1st - 12th Grade

10 Qs

TEST SOP LOGICAL ACCESS

TEST SOP LOGICAL ACCESS

1st Grade - Professional Development

10 Qs

NSM-4

NSM-4

Assessment

Quiz

Computers

1st Grade

Practice Problem

Hard

Created by

Minh Nguyễn

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?


  • DNS poisoning

  • session hijacking

  • SYN flood

  • DDoS

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In which type of attack is falsified information used to redirect users to malicious Internet sites?

  • domain generation

  • ARP cache poisoning

  • DNS amplification and reflection

  • DNS cache poisoning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

  • data

  • security

  • employee

  • company

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.)

  • hardware used by applications

  • data analysis trends

  • number of systems on each network

  • network baseline data

  • important applications used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the MITRE Corporation create and maintain?

  • IOC

  • TAXII

  • CVE

  • STIX

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do several network organizations, professionals, and intelligence agencies use shared open standards for threat intelligence?

  • to ensure real-time synchronization of all antivirus signature databases

  • to enable exchange of all response mechanisms to new threats

  • to update all vulnerabilities databases across all malware vendors

  • to enable the exchange of CTI in an automated, consistent, and machine readable format

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?