Chapter 17 Quiz 2

Chapter 17 Quiz 2

12th Grade

15 Qs

quiz-placeholder

Similar activities

APCSP Vocabulary

APCSP Vocabulary

10th - 12th Grade

18 Qs

Understanding the World Wide Web [AQA A Level]

Understanding the World Wide Web [AQA A Level]

12th Grade

10 Qs

A+203 - TCP/IP

A+203 - TCP/IP

11th Grade - University

16 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

Administrasi Sistem Jaringan 3

Administrasi Sistem Jaringan 3

12th Grade - University

20 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

MTA Network Fundamentals: Lesson 2

MTA Network Fundamentals: Lesson 2

11th Grade - University

16 Qs

Cyber EOP - DHCP DNS Gateway Subnet Mask By Mr. B

Cyber EOP - DHCP DNS Gateway Subnet Mask By Mr. B

12th Grade - University

18 Qs

Chapter 17 Quiz 2

Chapter 17 Quiz 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ann Watterson

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must a security analyst do to prevent DNS tunneling?

Implement a solution to block outbound communications

Increase the bandwidth of the network

Disable all DNS services

Use only static IP addresses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens to data in a DNS tunneling attack using TXT records?

It is encrypted with a public key

It is split into multiple encoded chunks

It is compressed into a single file

It is deleted after transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the recursive DNS service do in a DNS tunneling attack?

It encrypts the data

It forwards the query to the attacker’s authoritative name server

It blocks the query

It sends the query back to the user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the attacker’s authoritative name server do upon receiving DNS queries?

It deletes the queries

It sends responses containing encapsulated, encoded commands

It forwards the queries to another server

It logs the queries for future analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the malware on the compromised host do with the received chunks?

It deletes them

It recombines them and executes the commands

It sends them to another host

It encrypts them for storage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to stop DNS tunneling?

A filter that inspects DNS traffic

A firewall that blocks all traffic

A VPN service

A proxy server

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of DNS tunneling traffic?

It is always encrypted

It often contains suspicious domains

It is faster than normal traffic

It is always from trusted sources

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?