
CPE 315 Finals Exam
Authored by Monarjay Malbog
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
In what way are zombies used in security attacks?
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
3 mins • 1 pt
What is the purpose of a rootkit?
Evaluate responses using AI:
OFF
3.
OPEN ENDED QUESTION
3 mins • 1 pt
What is the main goal of using different evasion techniques by the threat actors?
Evaluate responses using AI:
OFF
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack is port scanning?
Reconnaissance
Access
DoS
Social Engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware typically displays annoying pop-ups to generate revenue for its author?
Adware
Ransomware
Scareware
Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What allows analysts to request and receive information about the operation of network devices?
NetFlow
SIEM
Tcpdump
SNMP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Traffic that enters the switch.
Ingress
Egress
Forward
Reverse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?