NSM-4

NSM-4

1st Grade

6 Qs

quiz-placeholder

Similar activities

DHCP

DHCP

1st - 3rd Grade

10 Qs

Hackers and Viruses

Hackers and Viruses

1st Grade

10 Qs

Network Types

Network Types

1st - 3rd Grade

10 Qs

DNS

DNS

1st - 3rd Grade

9 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

types of network

types of network

1st - 10th Grade

9 Qs

Network and Server Attacks

Network and Server Attacks

1st - 5th Grade

10 Qs

Administrasi Sistem Jaringan

Administrasi Sistem Jaringan

1st Grade

7 Qs

NSM-4

NSM-4

Assessment

Quiz

Computers

1st Grade

Hard

Created by

Minh Nguyễn

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?


  • DNS poisoning

  • session hijacking

  • SYN flood

  • DDoS

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In which type of attack is falsified information used to redirect users to malicious Internet sites?

  • domain generation

  • ARP cache poisoning

  • DNS amplification and reflection

  • DNS cache poisoning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

  • data

  • security

  • employee

  • company

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.)

  • hardware used by applications

  • data analysis trends

  • number of systems on each network

  • network baseline data

  • important applications used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the MITRE Corporation create and maintain?

  • IOC

  • TAXII

  • CVE

  • STIX

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do several network organizations, professionals, and intelligence agencies use shared open standards for threat intelligence?

  • to ensure real-time synchronization of all antivirus signature databases

  • to enable exchange of all response mechanisms to new threats

  • to update all vulnerabilities databases across all malware vendors

  • to enable the exchange of CTI in an automated, consistent, and machine readable format

Discover more resources for Computers