
Module 8 (Fundamentals of Cybersecurity_
Authored by Kelly Gafford
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack positions the threat actor between two parties?
Man-in-the-middle
Session replay
Man-in-the-browser
Address Resolution Protocol Poisoning
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Which type of attack is a variation of an MITM where the attack alters and then sends the transmission immediately. This attack makes a copy of the legitimate transmission before sending it to the recipient and is later used when the MITM replays the transmission?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ARP poisoning changes the associated MAC address and IP address to point to a different device.
True
False
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are Layer 2 attacks
MAC Cloning
MAC Flooding
DNS Hijacking
DDoS
5.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Which type of attack bombards a system with “bogus” requests overwhelming the system to that it cannot respond to legitimate requests?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack takes advantage of utilities such as powershell or BASH?
Scripting attack
DNS Poisoning
Python attack
MAC Flooding
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which utility will show the details about the path a packet takes from a device to a destination
tracert
nslookup
ping
traceroute
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?