Resiliency and Site Security

Resiliency and Site Security

9th Grade

25 Qs

quiz-placeholder

Similar activities

Jadi Programmer | Kampung Koding

Jadi Programmer | Kampung Koding

10th Grade - Professional Development

20 Qs

Software Engineering Quiz 1

Software Engineering Quiz 1

University

20 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

GAD Review - Game Industry

GAD Review - Game Industry

9th - 12th Grade

22 Qs

UH 1 Ms. Excel

UH 1 Ms. Excel

7th - 9th Grade

21 Qs

Remidi UTS AIJ

Remidi UTS AIJ

12th Grade

20 Qs

Programming: Which Loop?

Programming: Which Loop?

9th - 12th Grade

20 Qs

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

1st Grade - Professional Development

20 Qs

Resiliency and Site Security

Resiliency and Site Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Carlos Sowell

Used 8+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Keypad locks

Smart card

Proximity card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Password sniffing

Brute force attack

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which passive reconnaissance tool is used to gather information from a variety of public sources?

theHarvester

scanless

Shodan

Packet sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?

Nessus

Wireshark

nmap

OVAL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?

DNS-based on-path attack

DNS attack indicators

DNS poisoning

DNS client cache poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?

Port mirroring

MAC spoofing

ARP poisoning

MAC flooding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Network-based firewall

Host-based firewall

Signature-based IDS

Antivirus scanner

Anomaly-based IDS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?