Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

quiz-placeholder

Similar activities

CHAPTERS 6-13 - CHARACTERS, SETTING, AND PLOT

CHAPTERS 6-13 - CHARACTERS, SETTING, AND PLOT

KG - University

25 Qs

Expository

Expository

KG - University

25 Qs

Intermediate Accounting 1

Intermediate Accounting 1

University

26 Qs

AbPsych Quiz #4

AbPsych Quiz #4

University

28 Qs

Chapter 1

Chapter 1

KG - University

25 Qs

NSTP1 QUIZ

NSTP1 QUIZ

University

24 Qs

Risk Management (Topic 4)

Risk Management (Topic 4)

University

28 Qs

Chapter 10 Airway Management

Chapter 10 Airway Management

University

25 Qs

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

Assessment

Quiz

Other

University

Easy

Created by

awit yawa

Used 8+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

spyware

  • phishing

DDoS

  • social engineering

  • adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What causes a buffer overflow?

  • downloading and installing too many software updates at one time

attempting to write more data to a memory location than that location can hold

  • sending too much information to two or more interfaces of the same device, thereby causing dropped packets

  • sending repeated connections such as Telnet to a particular device, thus denying other data sources

  • launching a security countermeasure to mitigate a Trojan horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which objective of secure communications is achieved by encrypting data?

  • authentication

confidentiality

  • integrity

  • availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of malware has the primary objective of spreading across the network?

  • virus

  • botnet

  • Trojan horse

  • worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which algorithm can ensure data confidentiality?

  • MD5

  • PKI

  • AES

  • RSA

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6. What three items are components of the CIA triad? (Choose three.)

scalibility

access

confidentiality

integrity

availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?

  • address spoofing

  • ICMP redirect

  • DDoS

  • MITM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?