3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

quiz-placeholder

Similar activities

untitled

untitled

11th Grade - University

15 Qs

GIS UNIT-3 Quiz

GIS UNIT-3 Quiz

University

20 Qs

Edukasi Keamanan Siber

Edukasi Keamanan Siber

University

20 Qs

ICT 0513 - Chapter 4 : System Unit

ICT 0513 - Chapter 4 : System Unit

University

15 Qs

Pra UPS 2

Pra UPS 2

University

20 Qs

Sumatif 1 Dampak Sosial Informatika

Sumatif 1 Dampak Sosial Informatika

9th Grade - University

15 Qs

Quiz Inf X.B

Quiz Inf X.B

10th Grade - University

20 Qs

QUIZ IT DASAR

QUIZ IT DASAR

10th Grade - University

20 Qs

3A-DDC313-SW5

3A-DDC313-SW5

Assessment

Quiz

Computers

University

Medium

Created by

Juvy Cruz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker intercepts and alters communications between a client and server over an unsecure network.

What type of attack is this?

Man-in-the-Middle (MITM)

DDoS

Phishing

SQL Injection

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.

What type of attack is this?

Distributed Denial of Service (DDoS)

Spoofing

SQL Injection

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.

What attack is this?

ARP Spoofing

DNS Spoofing

Man-in-the-Middle Attack

Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.

What type of attack is this?

Brute Force Attack

Phishing

Cross-Site Scripting (XSS)

Keylogging

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.

What is this attack called?

DNS Spoofing

ARP Poisoning

MITM Attack

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.

What type of attack is this?

DDoS SYN Flood

SQL Injection

Cross-Site Scripting (XSS)

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.

What type of attack is this?

Brute Force Attack

Zero-Day Attack

Ransomware

Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?