LO2:Types of attacks  Quiz

LO2:Types of attacks Quiz

12th Grade

8 Qs

quiz-placeholder

Similar activities

Internet Test Review

Internet Test Review

10th - 12th Grade

10 Qs

Unit 1 Chapter 2 Test

Unit 1 Chapter 2 Test

12th Grade

10 Qs

A2 Computer Network-based Threats

A2 Computer Network-based Threats

12th Grade

11 Qs

5.3 Basic Diagnostic Commands

5.3 Basic Diagnostic Commands

9th - 12th Grade

10 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

4. razred TŠRB - DIOIS - Analiza mrežnog prometa

4. razred TŠRB - DIOIS - Analiza mrežnog prometa

12th Grade

12 Qs

Warstwy oraz protokoły

Warstwy oraz protokoły

8th - 12th Grade

10 Qs

Watering Hole Attacks

Watering Hole Attacks

10th - 12th Grade

10 Qs

LO2:Types of attacks  Quiz

LO2:Types of attacks Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

MAHER ALN

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a SYN flood attack?

An attack where a hacker sends oversized ICMP packets to crash the system

An attack where an overwhelming number of SYN requests make the ports busy and unable to serve legitimate requests

An attack that involves sniffing data packets to read them in transit

An attack where an unauthorized user impersonates a device in the network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of ICMP in a network?

It encrypts data packets for secure transmission

It reports transmission errors and checks the status of devices

It filters incoming and outgoing data packets in a network

It prevents unauthorized users from accessing a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during an ICMP flood attack?

The attacker sends oversized ICMP packets to crash the server

The attacker sends a large number of ICMP requests to exhaust server bandwidth, causing a crash

The attacker impersonates an authorized user to steal data

The attacker encrypts data to prevent access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "Ping of Death" attack?

Sending oversized ICMP packets that exceed the allowed size, crashing the system

Continuously sending ping requests to the server until it crashes

Sniffing packets from an active session to steal data

Redirecting data packets to an unauthorized device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is passive packet sniffing?

The process of reading and analyzing data packets without altering them

Changing data packets in transit to redirect them to a different destination

Flooding a network with large numbers of packets to overwhelm the server

Sniffing packets to impersonate an authorized device on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key characteristic of an on-path (man-in-the-middle) attack?

A hacker floods a network with fake requests

An attacker positions themselves between two communicating devices to intercept or alter data

The attacker uses a forward proxy to redirect traffic to an external server

The attacker sends oversized packets to crash the server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a replay attack?

Overloading a server with a flood of requests

Delaying or repeating a captured data packet to impersonate an authorized user

Redirecting data packets to a malicious device

Sniffing network traffic for sensitive information

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a smurf attack?

A DDoS attack combined with IP spoofing to overwhelm a target with data packets

A passive packet sniffing attack to read data in transit

An attack that involves sending oversized ICMP packets to crash a server

An attack that manipulates DNS servers to redirect traffic