Resiliency and Site Security
Quiz
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Carlos Sowell
Used 9+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Keypad locks
Smart card
Proximity card
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Password sniffing
Brute force attack
Keylogger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which passive reconnaissance tool is used to gather information from a variety of public sources?
theHarvester
scanless
Shodan
Packet sniffing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
Nessus
Wireshark
nmap
OVAL
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?
DNS-based on-path attack
DNS attack indicators
DNS poisoning
DNS client cache poisoning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?
Port mirroring
MAC spoofing
ARP poisoning
MAC flooding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Network-based firewall
Host-based firewall
Signature-based IDS
Antivirus scanner
Anomaly-based IDS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
lilja_mak
Quiz
•
5th - 11th Grade
20 questions
Control Structures C#
Quiz
•
University
20 questions
NP IT Quiz ปริศนาไอที #4
Quiz
•
9th - 12th Grade
20 questions
Pretest TIK
Quiz
•
10th Grade
20 questions
Pointers
Quiz
•
12th Grade
21 questions
Google Sheets
Quiz
•
12th Grade
20 questions
KOMPUTER
Quiz
•
7th - 9th Grade
20 questions
Advantages and Disadvantages of Collecting Data
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
