IP Vulnerabilities and Threats Quiz

IP Vulnerabilities and Threats Quiz

University

29 Qs

quiz-placeholder

Similar activities

STTGDC ELECTRICAL 1ST INTERMEDIATE EXAM

STTGDC ELECTRICAL 1ST INTERMEDIATE EXAM

University

25 Qs

AWS MODULE 10

AWS MODULE 10

University

30 Qs

Data Owners/Subjects

Data Owners/Subjects

University

25 Qs

[QUIZ] Chapter 1 - Chapter 3

[QUIZ] Chapter 1 - Chapter 3

University

30 Qs

10212EC112 - Video Analytics - Unit 1 - ICT Tools

10212EC112 - Video Analytics - Unit 1 - ICT Tools

University

30 Qs

Internet and Networking

Internet and Networking

University

30 Qs

EC8702_ADWSN_Model-2_Part-A

EC8702_ADWSN_Model-2_Part-A

University

30 Qs

Trial CU4

Trial CU4

University

30 Qs

IP Vulnerabilities and Threats Quiz

IP Vulnerabilities and Threats Quiz

Assessment

Quiz

Education

University

Medium

Created by

AHMAD ABIDIN

Used 2+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a cybersecurity class, Jackson is curious about network attacks. He asks, what type of attack uses ICMP echo packets to discover hosts on a network?

ICMP Attacks

ARP Spoofing

DNS Tunneling

SYN Flood Attack

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mia is studying network security and comes across a type of attack that involves spoofing the source IP address in a packet. What is this attack called?

TCP Reset Attack

Session Hijacking

UDP Flood Attack

Address Spoofing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a class project, Benjamin discovered that someone was intercepting messages between him and Mia. What is the primary purpose of a man-in-the-middle (MITM) attack?

To perform DoS attacks

To monitor and alter communication

To discover network topology

To hijack sessions

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a group project, Emma and Aiden are discussing the characteristics of TCP. Which of the following is a characteristic of TCP?

Connectionless protocol

Reliable delivery

No flow control

Lower overhead than UDP

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ethan is trying to understand different types of cyber attacks. He learns about an attack that sends multiple SYN requests to a web server. What is this type of attack called?

ICMP Redirect Attack

ARP Cache Poisoning

TCP SYN Flood Attack

UDP Flood Attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a cybersecurity class, Sophia asked her classmates about common techniques used in DNS attacks. Which of the following did they discuss?

Session Hijacking

SYN Flooding

MAC Address Spoofing

Fast Flux

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a class project, Zoe discovered that ARP cache poisoning could be used to manipulate network traffic. What does ARP cache poisoning aim to achieve?

Redirect traffic to a malicious server

Alter TCP segments

Perform a DoS attack

Discover network hosts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?