NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

University

15 Qs

quiz-placeholder

Similar activities

IP essential protocol

IP essential protocol

University

10 Qs

Nmap Options, Host Discovery, and Port Scanning

Nmap Options, Host Discovery, and Port Scanning

6th Grade - University

16 Qs

Tema 4 - SI

Tema 4 - SI

University

10 Qs

UBL JARKOM CHAP7

UBL JARKOM CHAP7

University

10 Qs

Network Protocols and Models Quiz

Network Protocols and Models Quiz

University

19 Qs

Unidad 4. Métodos de ataque a equipos y redes

Unidad 4. Métodos de ataque a equipos y redes

University

10 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

Network Level Attack Quiz

Network Level Attack Quiz

University

10 Qs

NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

Assessment

Quiz

Computers

University

Hard

Created by

HARSHALI PATIL

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a vulnerability commonly found in the Application Layer of the TCP/IP model?

TCP Sequence Number Prediction

SYN Flood

Session Hijacking

ICMP Redirect Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk associated with DNS Cache Poisoning?

Loss of data integrity

Redirecting users to malicious websites

Overloading network traffic

Unauthorized access to network devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves an attacker impersonating a user or service by modifying cookies?

Session Hijacking

Replay Attack

Cross-Site Scripting (XSS)

Cookie Poisoning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol vulnerability is exploited during a SYN Flood attack?

TCP

ICMP

UDP

DNS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What countermeasure can protect against session hijacking attacks?

Use of strong passwords

Use of HTTPS for encrypted communication

Regular password changes

Multi-factor authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a Denial of Service (DoS) attack?

To gain unauthorized access to systems

To disrupt the availability of a service

To steal sensitive information

To modify data in transit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main vulnerability of the RIP protocol in the Internetwork Layer?

Lack of encryption

Inability to handle large networks

Lack of authentication for routing information

Poor error handling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?