Module 8 (Fundamentals of Cybersecurity_

Module 8 (Fundamentals of Cybersecurity_

University

10 Qs

quiz-placeholder

Similar activities

OSI Model

OSI Model

University

15 Qs

Computer Networks

Computer Networks

University

13 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

RandonQuestionRoutingChapter10

RandonQuestionRoutingChapter10

University

12 Qs

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

ITN260: Chapter 5 & 6 Test Review

ITN260: Chapter 5 & 6 Test Review

11th Grade - Professional Development

14 Qs

CCNA Network Attack Mitigations

CCNA Network Attack Mitigations

University

10 Qs

Information Security Lab Quiz # 2

Information Security Lab Quiz # 2

University

15 Qs

Module 8 (Fundamentals of Cybersecurity_

Module 8 (Fundamentals of Cybersecurity_

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack positions the threat actor between two parties?
Man-in-the-middle
Session replay
Man-in-the-browser
Address Resolution Protocol Poisoning

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Which type of attack is a variation of an MITM where the attack alters and then sends the transmission immediately. This attack makes a copy of the legitimate transmission before sending it to the recipient and is later used when the MITM replays the transmission?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ARP poisoning changes the associated MAC address and IP address to point to a different device.
True
False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are Layer 2 attacks
MAC Cloning

MAC Flooding

DNS Hijacking
DDoS

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Which type of attack bombards a system with “bogus” requests overwhelming the system to that it cannot respond to legitimate requests?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack takes advantage of utilities such as powershell or BASH?
Scripting attack
DNS Poisoning
Python attack
MAC Flooding

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which utility will show the details about the path a packet takes from a device to a destination
tracert
nslookup
ping

traceroute

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?