Search Header Logo

LO2:Types of attacks Quiz

Authored by MAHER ALN

Computers

12th Grade

Used 2+ times

LO2:Types of attacks  Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a SYN flood attack?

An attack where a hacker sends oversized ICMP packets to crash the system

An attack where an overwhelming number of SYN requests make the ports busy and unable to serve legitimate requests

An attack that involves sniffing data packets to read them in transit

An attack where an unauthorized user impersonates a device in the network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of ICMP in a network?

It encrypts data packets for secure transmission

It reports transmission errors and checks the status of devices

It filters incoming and outgoing data packets in a network

It prevents unauthorized users from accessing a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during an ICMP flood attack?

The attacker sends oversized ICMP packets to crash the server

The attacker sends a large number of ICMP requests to exhaust server bandwidth, causing a crash

The attacker impersonates an authorized user to steal data

The attacker encrypts data to prevent access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "Ping of Death" attack?

Sending oversized ICMP packets that exceed the allowed size, crashing the system

Continuously sending ping requests to the server until it crashes

Sniffing packets from an active session to steal data

Redirecting data packets to an unauthorized device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is passive packet sniffing?

The process of reading and analyzing data packets without altering them

Changing data packets in transit to redirect them to a different destination

Flooding a network with large numbers of packets to overwhelm the server

Sniffing packets to impersonate an authorized device on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key characteristic of an on-path (man-in-the-middle) attack?

A hacker floods a network with fake requests

An attacker positions themselves between two communicating devices to intercept or alter data

The attacker uses a forward proxy to redirect traffic to an external server

The attacker sends oversized packets to crash the server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a replay attack?

Overloading a server with a flood of requests

Delaying or repeating a captured data packet to impersonate an authorized user

Redirecting data packets to a malicious device

Sniffing network traffic for sensitive information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?