Chapter 17 Quiz 2

Chapter 17 Quiz 2

12th Grade

15 Qs

quiz-placeholder

Similar activities

Remidi UTS AIJ

Remidi UTS AIJ

12th Grade

20 Qs

องค์ประกอบการสื่อสารและเครือข่าย

องค์ประกอบการสื่อสารและเครือข่าย

8th Grade - University

10 Qs

Quarter 2 - Quiz no. 1

Quarter 2 - Quiz no. 1

12th Grade

15 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

2.5 The Broadband Internet Connection (Wireless)

2.5 The Broadband Internet Connection (Wireless)

11th - 12th Grade

17 Qs

SMKN 4 Jakarta Quiz MikroTik Dasar

SMKN 4 Jakarta Quiz MikroTik Dasar

12th Grade

16 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Chapter 17 Quiz 2

Chapter 17 Quiz 2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Ann Watterson

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must a security analyst do to prevent DNS tunneling?

Implement a solution to block outbound communications

Increase the bandwidth of the network

Disable all DNS services

Use only static IP addresses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens to data in a DNS tunneling attack using TXT records?

It is encrypted with a public key

It is split into multiple encoded chunks

It is compressed into a single file

It is deleted after transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the recursive DNS service do in a DNS tunneling attack?

It encrypts the data

It forwards the query to the attacker’s authoritative name server

It blocks the query

It sends the query back to the user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the attacker’s authoritative name server do upon receiving DNS queries?

It deletes the queries

It sends responses containing encapsulated, encoded commands

It forwards the queries to another server

It logs the queries for future analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the malware on the compromised host do with the received chunks?

It deletes them

It recombines them and executes the commands

It sends them to another host

It encrypts them for storage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to stop DNS tunneling?

A filter that inspects DNS traffic

A firewall that blocks all traffic

A VPN service

A proxy server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of DNS tunneling traffic?

It is always encrypted

It often contains suspicious domains

It is faster than normal traffic

It is always from trusted sources

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?