
Chapter 14 Quiz 5
Authored by Ann Watterson
Computers
12th Grade
Used 17+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a threat actor using a buffer overflow DoS attack?
To find a system memory-related flaw and exploit it
To steal user credentials
To install malware on a server
To gain administrative access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when a buffer overflow attack is successful?
The system becomes faster
The system becomes inoperable
The system gains more memory
The system starts a backup process
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the "Ping of Death"?
A type of malware
A malformed packet attack
A phishing technique
A firewall bypass method
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the maximum packet size that the "Ping of Death" exceeded?
32,768 bytes
65,535 bytes
128,000 bytes
256,000 bytes
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the effect of a buffer overflow on adjacent memory?
It enhances memory capacity
It overwrites and corrupts it
It compresses the data
It encrypts the memory
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you search for to read a description of a specific attack?
"WINDOWS-2020-1234 blog"
"TALOS-2016-0191 blog"
"LINUX-2018-5678 blog"
"MACOS-2019-4321 blog"
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main reason for using stealthy evasion techniques?
To increase attack visibility
To evade network and host defenses
To reduce attack costs
To improve system performance
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?