Search Header Logo

3A-DDC313-SW5

Authored by Juvy Cruz

Computers

University

Used 1+ times

3A-DDC313-SW5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker intercepts and alters communications between a client and server over an unsecure network.

What type of attack is this?

Man-in-the-Middle (MITM)

DDoS

Phishing

SQL Injection

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.

What type of attack is this?

Distributed Denial of Service (DDoS)

Spoofing

SQL Injection

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.

What attack is this?

ARP Spoofing

DNS Spoofing

Man-in-the-Middle Attack

Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.

What type of attack is this?

Brute Force Attack

Phishing

Cross-Site Scripting (XSS)

Keylogging

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.

What is this attack called?

DNS Spoofing

ARP Poisoning

MITM Attack

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.

What type of attack is this?

DDoS SYN Flood

SQL Injection

Cross-Site Scripting (XSS)

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.

What type of attack is this?

Brute Force Attack

Zero-Day Attack

Ransomware

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?