3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

quiz-placeholder

Similar activities

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

25 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

SRWE-Refreshing Activity

SRWE-Refreshing Activity

University

18 Qs

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

3A-DDC313-SW5

3A-DDC313-SW5

Assessment

Quiz

Computers

University

Medium

Created by

Juvy Cruz

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker intercepts and alters communications between a client and server over an unsecure network.

What type of attack is this?

Man-in-the-Middle (MITM)

DDoS

Phishing

SQL Injection

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.

What type of attack is this?

Distributed Denial of Service (DDoS)

Spoofing

SQL Injection

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.

What attack is this?

ARP Spoofing

DNS Spoofing

Man-in-the-Middle Attack

Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.

What type of attack is this?

Brute Force Attack

Phishing

Cross-Site Scripting (XSS)

Keylogging

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.

What is this attack called?

DNS Spoofing

ARP Poisoning

MITM Attack

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.

What type of attack is this?

DDoS SYN Flood

SQL Injection

Cross-Site Scripting (XSS)

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.

What type of attack is this?

Brute Force Attack

Zero-Day Attack

Ransomware

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?