Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

quiz-placeholder

Similar activities

Environmental Risk Management

Environmental Risk Management

University

25 Qs

Preventive Cybersecurity Quiz

Preventive Cybersecurity Quiz

12th Grade - University

25 Qs

Cybersecurity and IT Skills Quiz

Cybersecurity and IT Skills Quiz

University

30 Qs

Intro To Business&Tech

Intro To Business&Tech

9th Grade - Professional Development

25 Qs

CISSP CH8 Software Development Security

CISSP CH8 Software Development Security

University - Professional Development

25 Qs

Cloud

Cloud

University

28 Qs

Basic Information Security

Basic Information Security

University

24 Qs

MODULE 3 Disaster Risk Reduction and Management

MODULE 3 Disaster Risk Reduction and Management

University

25 Qs

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

Assessment

Quiz

Other

University

Medium

Created by

awit yawa

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

spyware

  • phishing

DDoS

  • social engineering

  • adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What causes a buffer overflow?

  • downloading and installing too many software updates at one time

attempting to write more data to a memory location than that location can hold

  • sending too much information to two or more interfaces of the same device, thereby causing dropped packets

  • sending repeated connections such as Telnet to a particular device, thus denying other data sources

  • launching a security countermeasure to mitigate a Trojan horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which objective of secure communications is achieved by encrypting data?

  • authentication

confidentiality

  • integrity

  • availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of malware has the primary objective of spreading across the network?

  • virus

  • botnet

  • Trojan horse

  • worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which algorithm can ensure data confidentiality?

  • MD5

  • PKI

  • AES

  • RSA

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6. What three items are components of the CIA triad? (Choose three.)

scalibility

access

confidentiality

integrity

availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?

  • address spoofing

  • ICMP redirect

  • DDoS

  • MITM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?