Search Header Logo

Network Security - Forms of Attack - CraignDave

Authored by Ms Baboolall

Computers

10th Grade

Used 1+ times

Network Security - Forms of Attack - CraignDave
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes malicious software designed to infect computers and commit crimes such as fraud or identity theft?

Adware

Malware

Firmware

Shareware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is best described as:

Tricking people into revealing personal information by posing as a trusted entity

Using trial-and-error methods to guess a password

Flooding a server with traffic to make it crash

Inserting malicious code into a database application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method relies on repeatedly attempting different password combinations until the correct one is discovered?

SQL injection

Worm infiltration

Brute-force attack

Trojan payload

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a server with a large volume of useless traffic, rendering it inaccessible to legitimate users, is known as:

Denial-of-service (DoS) attack

Man-in-the-middle attack

Ransomware exploit

Eavesdropping

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of network security, which statement best describes a Distributed Denial-of-Service (DDoS) attack?

A single compromised computer that scans for open ports

A system that repeatedly submits random login credentials

Multiple infected machines targeting one system simultaneously

An attack that exploits a website’s login form

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of data interception and theft?

Overloading network bandwidth to cause a server crash

Preventing users from accessing email accounts

Monitoring data streams to gather sensitive information

Damaging computer hardware through power surges

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to the act of monitoring network traffic (often in plain text) to capture sensitive data?

Spoofing

Tunneling

Sniffing (eavesdropping)

SQL injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?