Resiliency and Site Security
Quiz
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Carlos Sowell
Used 9+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Keypad locks
Smart card
Proximity card
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Password sniffing
Brute force attack
Keylogger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which passive reconnaissance tool is used to gather information from a variety of public sources?
theHarvester
scanless
Shodan
Packet sniffing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
Nessus
Wireshark
nmap
OVAL
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?
DNS-based on-path attack
DNS attack indicators
DNS poisoning
DNS client cache poisoning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?
Port mirroring
MAC spoofing
ARP poisoning
MAC flooding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Network-based firewall
Host-based firewall
Signature-based IDS
Antivirus scanner
Anomaly-based IDS
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
مراجعة-علوم الحاسب-نهاية ف2
Quiz
•
11th Grade
20 questions
TEST1.PY
Quiz
•
10th Grade - University
20 questions
MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND
Quiz
•
University
20 questions
Database&Relation
Quiz
•
12th Grade
20 questions
Ulangan Harian - Jaringan Komputer & Analisis Data
Quiz
•
10th Grade
20 questions
Review Quiz (Chapter 3&4)
Quiz
•
University
20 questions
ĐC CNTT_Chương 1
Quiz
•
University
20 questions
C Programming Unit-1 Test-2
Quiz
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
