Scenario:
An attacker intercepts and alters communications between a client and server over an unsecure network.
What type of attack is this?
3A-DDC313-SW5
Quiz
•
Computers
•
University
•
Medium
Juvy Cruz
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker intercepts and alters communications between a client and server over an unsecure network.
What type of attack is this?
Man-in-the-Middle (MITM)
DDoS
Phishing
SQL Injection
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.
What type of attack is this?
Distributed Denial of Service (DDoS)
Spoofing
SQL Injection
Buffer Overflow
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.
What attack is this?
ARP Spoofing
DNS Spoofing
Man-in-the-Middle Attack
Phishing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.
What type of attack is this?
Brute Force Attack
Phishing
Cross-Site Scripting (XSS)
Keylogging
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.
What is this attack called?
DNS Spoofing
ARP Poisoning
MITM Attack
Phishing
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.
What type of attack is this?
DDoS SYN Flood
SQL Injection
Cross-Site Scripting (XSS)
Ransomware
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.
What type of attack is this?
Brute Force Attack
Zero-Day Attack
Ransomware
Phishing
18 questions
SIC quiz 2
Quiz
•
University
20 questions
cyber awareness
Quiz
•
University
20 questions
cyberattacks
Quiz
•
University
25 questions
Resiliency and Site Security
Quiz
•
9th Grade - University
15 questions
1.3 - Surveying the Cyberspace
Quiz
•
University
20 questions
Network and Internet Security
Quiz
•
University
20 questions
024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2
Quiz
•
9th Grade - University
20 questions
IS Quiz-1
Quiz
•
University
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade