
IP Vulnerabilities and Threats Quiz
Authored by AHMAD ABIDIN
Education
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Jackson is curious about network attacks. He asks, what type of attack uses ICMP echo packets to discover hosts on a network?
ICMP Attacks
ARP Spoofing
DNS Tunneling
SYN Flood Attack
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Mia is studying network security and comes across a type of attack that involves spoofing the source IP address in a packet. What is this attack called?
TCP Reset Attack
Session Hijacking
UDP Flood Attack
Address Spoofing
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a class project, Benjamin discovered that someone was intercepting messages between him and Mia. What is the primary purpose of a man-in-the-middle (MITM) attack?
To perform DoS attacks
To monitor and alter communication
To discover network topology
To hijack sessions
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a group project, Emma and Aiden are discussing the characteristics of TCP. Which of the following is a characteristic of TCP?
Connectionless protocol
Reliable delivery
No flow control
Lower overhead than UDP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ethan is trying to understand different types of cyber attacks. He learns about an attack that sends multiple SYN requests to a web server. What is this type of attack called?
ICMP Redirect Attack
ARP Cache Poisoning
TCP SYN Flood Attack
UDP Flood Attack
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Sophia asked her classmates about common techniques used in DNS attacks. Which of the following did they discuss?
Session Hijacking
SYN Flooding
MAC Address Spoofing
Fast Flux
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a class project, Zoe discovered that ARP cache poisoning could be used to manipulate network traffic. What does ARP cache poisoning aim to achieve?
Redirect traffic to a malicious server
Alter TCP segments
Perform a DoS attack
Discover network hosts
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?