Search Header Logo

Chapter 24.1 Quiz

Authored by Ann Watterson

Computers

12th Grade

Used 16+ times

Chapter 24.1 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can hackers do to syslog servers to hide exfiltration?

Encrypt the data

Block data transfer

Compress the data

Translate the messages

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can threat actors do to NTP systems to disrupt network availability?

Encrypt data

Corrupt time information

Compress data

Translate messages

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main benefit of centralizing log collection in syslog?

Reducing data size

Enhancing security monitoring

Improving video quality

Managing user accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common use of DNS by malware?

To enhance data encryption

To communicate with command-and-control servers

To improve network speed

To increase data storage capacity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main protocol of the World Wide Web?

FTP

SMTP

HTTP

DNS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a serious threat to privacy and identity in HTTP?

Data encryption

Data alteration or interception

Data compression

Data redundancy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main vulnerability of HTTP?

Lack of data compression

Lack of data encryption

Lack of data redundancy

Lack of data storage

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?