Resiliency and Site Security

Resiliency and Site Security

9th Grade

25 Qs

quiz-placeholder

Similar activities

BAB 11

BAB 11

University

20 Qs

BCTAA Network Setup Quiz

BCTAA Network Setup Quiz

12th Grade - University

20 Qs

10H2 - Networks 2

10H2 - Networks 2

10th Grade

21 Qs

Computer Fundamentals Quiz

Computer Fundamentals Quiz

12th Grade

20 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

Wireless Networks Quiz 1

Wireless Networks Quiz 1

University

20 Qs

Intrusion Detection Systems

Intrusion Detection Systems

University

20 Qs

L2 ICT U1 Internet Infrastructure Quiz

L2 ICT U1 Internet Infrastructure Quiz

11th Grade

21 Qs

Resiliency and Site Security

Resiliency and Site Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Carlos Sowell

Used 8+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Keypad locks

Smart card

Proximity card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Password sniffing

Brute force attack

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which passive reconnaissance tool is used to gather information from a variety of public sources?

theHarvester

scanless

Shodan

Packet sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?

Nessus

Wireshark

nmap

OVAL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?

DNS-based on-path attack

DNS attack indicators

DNS poisoning

DNS client cache poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?

Port mirroring

MAC spoofing

ARP poisoning

MAC flooding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Network-based firewall

Host-based firewall

Signature-based IDS

Antivirus scanner

Anomaly-based IDS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?