CN2-Chapter-1

CN2-Chapter-1

University

5 Qs

quiz-placeholder

Similar activities

OSI Model - Network Layer

OSI Model - Network Layer

9th Grade - Professional Development

10 Qs

Man in the Middle Attack

Man in the Middle Attack

University

7 Qs

CN4v6  Chap 5

CN4v6 Chap 5

University

5 Qs

ASJ-11 (Latihan1)

ASJ-11 (Latihan1)

12th Grade - Professional Development

10 Qs

DHCP Configuration – CompTIA A+ 220-1101 – 2.6

DHCP Configuration – CompTIA A+ 220-1101 – 2.6

University

10 Qs

CyberCrime

CyberCrime

5th Grade - Professional Development

10 Qs

Chapter 20

Chapter 20

University

10 Qs

Types of Attack

Types of Attack

University

10 Qs

CN2-Chapter-1

CN2-Chapter-1

Assessment

Quiz

Computers

University

Easy

Created by

Anoop Jacob

Used 9+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim?
DDoS
Data Breach
Malware
Ransomware

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes?
Authentication
Authorization
Accounting
Client

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?
IPSG
DHCP Snooping
DAI
Port Security

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What mitigation technique must be implemented to prevent MAC address overflow attacks?
IPSG
DAI
Port Security
DHCP Snooping

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A threat actor sends a BPDU message with priority 0. What type of attack is this?
STP Attack
DHCP Starvation
ARP Spoofing
Address Spoofing