
3A-DDC313-SW5
Authored by Juvy Cruz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker intercepts and alters communications between a client and server over an unsecure network.
What type of attack is this?
Man-in-the-Middle (MITM)
DDoS
Phishing
SQL Injection
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.
What type of attack is this?
Distributed Denial of Service (DDoS)
Spoofing
SQL Injection
Buffer Overflow
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.
What attack is this?
ARP Spoofing
DNS Spoofing
Man-in-the-Middle Attack
Phishing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.
What type of attack is this?
Brute Force Attack
Phishing
Cross-Site Scripting (XSS)
Keylogging
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.
What is this attack called?
DNS Spoofing
ARP Poisoning
MITM Attack
Phishing
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.
What type of attack is this?
DDoS SYN Flood
SQL Injection
Cross-Site Scripting (XSS)
Ransomware
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.
What type of attack is this?
Brute Force Attack
Zero-Day Attack
Ransomware
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
CSN6224 Quiz1
Quiz
•
University
20 questions
Kuis Model Komunikasi dalam Jaringan
Quiz
•
University
18 questions
The Rise of Intelligent Machines
Quiz
•
8th Grade - University
20 questions
WebFundamentals
Quiz
•
University
20 questions
Cloud Deployment
Quiz
•
University
20 questions
QUIZ S1 Jaringan 2024
Quiz
•
University
20 questions
икт 21-40
Quiz
•
1st Grade - University
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University