
Network Security - Forms of Attack - CraignDave
Authored by Ms Baboolall
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term best describes malicious software designed to infect computers and commit crimes such as fraud or identity theft?
Adware
Malware
Firmware
Shareware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is best described as:
Tricking people into revealing personal information by posing as a trusted entity
Using trial-and-error methods to guess a password
Flooding a server with traffic to make it crash
Inserting malicious code into a database application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack method relies on repeatedly attempting different password combinations until the correct one is discovered?
SQL injection
Worm infiltration
Brute-force attack
Trojan payload
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Flooding a server with a large volume of useless traffic, rendering it inaccessible to legitimate users, is known as:
Denial-of-service (DoS) attack
Man-in-the-middle attack
Ransomware exploit
Eavesdropping
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of network security, which statement best describes a Distributed Denial-of-Service (DDoS) attack?
A single compromised computer that scans for open ports
A system that repeatedly submits random login credentials
Multiple infected machines targeting one system simultaneously
An attack that exploits a website’s login form
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of data interception and theft?
Overloading network bandwidth to cause a server crash
Preventing users from accessing email accounts
Monitoring data streams to gather sensitive information
Damaging computer hardware through power surges
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms refers to the act of monitoring network traffic (often in plain text) to capture sensitive data?
Spoofing
Tunneling
Sniffing (eavesdropping)
SQL injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?