NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

University

15 Qs

quiz-placeholder

Similar activities

Squad- N1

Squad- N1

University

11 Qs

Network Level Attack Quiz

Network Level Attack Quiz

University

10 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

UBL JARKOM CHAP7

UBL JARKOM CHAP7

University

10 Qs

Perguntas com Rasteira

Perguntas com Rasteira

KG - University

10 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Unidad 4. Métodos de ataque a equipos y redes

Unidad 4. Métodos de ataque a equipos y redes

University

10 Qs

TCP және UDP протоколдарының айырмашылығы

TCP және UDP протоколдарының айырмашылығы

University

12 Qs

NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

Assessment

Quiz

Computers

University

Hard

Created by

HARSHALI PATIL

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a vulnerability commonly found in the Application Layer of the TCP/IP model?

TCP Sequence Number Prediction

SYN Flood

Session Hijacking

ICMP Redirect Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk associated with DNS Cache Poisoning?

Loss of data integrity

Redirecting users to malicious websites

Overloading network traffic

Unauthorized access to network devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves an attacker impersonating a user or service by modifying cookies?

Session Hijacking

Replay Attack

Cross-Site Scripting (XSS)

Cookie Poisoning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol vulnerability is exploited during a SYN Flood attack?

TCP

ICMP

UDP

DNS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What countermeasure can protect against session hijacking attacks?

Use of strong passwords

Use of HTTPS for encrypted communication

Regular password changes

Multi-factor authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a Denial of Service (DoS) attack?

To gain unauthorized access to systems

To disrupt the availability of a service

To steal sensitive information

To modify data in transit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main vulnerability of the RIP protocol in the Internetwork Layer?

Lack of encryption

Inability to handle large networks

Lack of authentication for routing information

Poor error handling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?