Methods of Security Attacks

Methods of Security Attacks

11th Grade

31 Qs

quiz-placeholder

Similar activities

EMTECH 11

EMTECH 11

11th Grade

31 Qs

 Internet Basics Quiz

Internet Basics Quiz

6th Grade - University

30 Qs

Quiz Pengetahuan Umum

Quiz Pengetahuan Umum

7th Grade - University

30 Qs

TEST BANK: APPS AND OPERATING SYSTEMS

TEST BANK: APPS AND OPERATING SYSTEMS

9th Grade - University

29 Qs

Uji Pengetahuan Aplikasi Mobile

Uji Pengetahuan Aplikasi Mobile

11th Grade - University

30 Qs

Systems Administration -2

Systems Administration -2

9th Grade - University

35 Qs

Quiz1

Quiz1

2nd Grade - University

30 Qs

CIS: Week 2 Quiz

CIS: Week 2 Quiz

9th - 12th Grade

30 Qs

Methods of Security Attacks

Methods of Security Attacks

Assessment

Quiz

Information Technology (IT)

11th Grade

Easy

Created by

ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Used 3+ times

FREE Resource

31 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are passive attacks in security?

Evaluate responses using AI:

OFF

Answer explanation

Passive attacks in security involve eavesdropping or monitoring data without altering it. Attackers gather information without detection, making it difficult to prevent or trace, unlike active attacks that disrupt or manipulate data.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What are active attacks in security?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What are close-in attacks?

Evaluate responses using AI:

OFF

Answer explanation

Close-in attacks refer to security threats that occur when an attacker is physically close to a target, allowing them to exploit vulnerabilities directly, often bypassing remote defenses.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What are insider attacks?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a reconnaissance attack?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

What is an access attack?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is a DoS/DDoS attack?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?