Search Header Logo

IP Vulnerabilities and Threats Quiz

Authored by AHMAD ABIDIN

Education

University

Used 2+ times

IP Vulnerabilities and Threats Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a cybersecurity class, Jackson is curious about network attacks. He asks, what type of attack uses ICMP echo packets to discover hosts on a network?

ICMP Attacks

ARP Spoofing

DNS Tunneling

SYN Flood Attack

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mia is studying network security and comes across a type of attack that involves spoofing the source IP address in a packet. What is this attack called?

TCP Reset Attack

Session Hijacking

UDP Flood Attack

Address Spoofing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a class project, Benjamin discovered that someone was intercepting messages between him and Mia. What is the primary purpose of a man-in-the-middle (MITM) attack?

To perform DoS attacks

To monitor and alter communication

To discover network topology

To hijack sessions

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a group project, Emma and Aiden are discussing the characteristics of TCP. Which of the following is a characteristic of TCP?

Connectionless protocol

Reliable delivery

No flow control

Lower overhead than UDP

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ethan is trying to understand different types of cyber attacks. He learns about an attack that sends multiple SYN requests to a web server. What is this type of attack called?

ICMP Redirect Attack

ARP Cache Poisoning

TCP SYN Flood Attack

UDP Flood Attack

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a cybersecurity class, Sophia asked her classmates about common techniques used in DNS attacks. Which of the following did they discuss?

Session Hijacking

SYN Flooding

MAC Address Spoofing

Fast Flux

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a class project, Zoe discovered that ARP cache poisoning could be used to manipulate network traffic. What does ARP cache poisoning aim to achieve?

Redirect traffic to a malicious server

Alter TCP segments

Perform a DoS attack

Discover network hosts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?