ISAM UNIT 3 LESSON 1a Quiz (Finals)

ISAM UNIT 3 LESSON 1a Quiz (Finals)

University

25 Qs

quiz-placeholder

Similar activities

WSALSA_TEST_2

WSALSA_TEST_2

University

20 Qs

Servicios de direccionamiento IP U6

Servicios de direccionamiento IP U6

University

20 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

TCP/IP

TCP/IP

10th Grade - Professional Development

25 Qs

Quiz-1 (The Network)

Quiz-1 (The Network)

University

22 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

ITN Final Exam Review 1-25

ITN Final Exam Review 1-25

University

22 Qs

Network devices and monitoring

Network devices and monitoring

9th Grade - University

21 Qs

ISAM UNIT 3 LESSON 1a Quiz (Finals)

ISAM UNIT 3 LESSON 1a Quiz (Finals)

Assessment

Quiz

Computers

University

Medium

Created by

Dyck Robles

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a primary goal of a Man-in-the-Middle (MITM) attack?

To encrypt communication

To impersonate or eavesdrop on parties

To strengthen communication between parties

To provide a secure channel

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What makes a session replay attack unique compared to other MITM attacks?

It intercepts and alters messages immediately

It copies a legitimate transmission and reuses it later

It only affects browsers

It doesn't involve interception

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol does an Address Resolution Protocol (ARP) poisoning attack exploit?

DNS

HTTP

ARP

TCP

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a DNS poisoning attack, which component is manipulated to redirect users to malicious sites?

Host table on a local device

IP protocol

Layer 2 header

URL of the legitimate site

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Man-in-the-Browser (MITB) attack is generally carried out using:

A Trojan browser extension

A DNS entry modification

MAC cloning

Layer 3 IP redirection

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main result of a MAC flooding attack?

MAC addresses are deleted from the switch

The switch enters a fail-open mode, broadcasting all frames to all ports

The MAC address table becomes more secure

DNS redirection occurs

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the focus of an interception attack?

To alter a DNS server

To intercept and possibly modify network communications

To flood the network with excess traffic

To manipulate IP addresses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?