Which of the following is NOT a type of attack listed in the network diagram section?
Sec Study Quiz 5

Quiz
•
Computers
•
Professional Development
•
Hard
Pat Johnson
FREE Resource
48 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
SQL Injection
Cross Site Scripting
XML Injection
Phishing
Answer explanation
The correct choice is Phishing because it is NOT a type of attack listed in the network diagram section.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the anonymizer in the network diagram?
To protect the web server
To hide the attacker's identity
To filter out malicious traffic
To store application source code
Answer explanation
The purpose of the anonymizer in the network diagram is to hide the attacker's identity, not to protect the web server, filter out malicious traffic, or store application source code.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the network diagram, where is the application source code repository located?
On the CRM server
On the attacker's tablet
Behind the firewall
Within the web server
Answer explanation
The application source code repository is located behind the firewall, as shown in the network diagram.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What device is directly connected to the internet in the network diagram?
Router
Switch A
Firewall
CRM Server
Answer explanation
The Firewall is directly connected to the internet in the network diagram as it acts as a barrier between the internal network and the internet, controlling incoming and outgoing traffic.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the function of the WAF in the context of the network diagram?
Web Application Firewall to protect against web-based attacks
Wide Area Filesystem for file sharing
Wireless Access Facility for network access
Workstation Application Function for desktop applications
Answer explanation
The function of the WAF in the context of the network diagram is to act as a Web Application Firewall to protect against web-based attacks.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack is NOT listed in the 'Select type of attack' section?
SQL Injection
Cross Site Scripting
Phishing
Session Hijacking
Answer explanation
The correct choice is Phishing because it is NOT listed in the 'Select type of attack' section.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is placed between the Internet and Switch A to protect the network?
Anonymizer
Firewall
Router
Web Server
Answer explanation
A firewall is placed between the Internet and Switch A to protect the network by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
Create a free account and access millions of resources
Similar Resources on Quizizz
50 questions
CompTIAA+ 220-1101 BurningIce (Part 1)

Quiz
•
Professional Development
49 questions
ITF+ Study Quiz 4

Quiz
•
Professional Development
44 questions
Quiz For COC 1 and COC 2

Quiz
•
Professional Development
50 questions
AICTE-STTP_"BlockChain & Applications" Slot-1_Assessment

Quiz
•
Professional Development
50 questions
Mạng Máy Tính

Quiz
•
Professional Development
43 questions
Data and Voice Copper Cabling Knowledge Check #1

Quiz
•
Professional Development
50 questions
SC-900 Day 3

Quiz
•
Professional Development
50 questions
Quizz Compition Round3 ( Computer Network & Excel)

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade