Resiliency and Site Security

Resiliency and Site Security

9th Grade

25 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Computer Networks

Computer Networks

9th - 11th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

Induction Unit 7 Assessment

Induction Unit 7 Assessment

12th Grade

20 Qs

client server

client server

10th - 11th Grade

21 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Cyber Security Unit 3 Exam

Cyber Security Unit 3 Exam

9th Grade

20 Qs

Resiliency and Site Security

Resiliency and Site Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Carlos Sowell

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Keypad locks

Smart card

Proximity card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Password sniffing

Brute force attack

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which passive reconnaissance tool is used to gather information from a variety of public sources?

theHarvester

scanless

Shodan

Packet sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?

Nessus

Wireshark

nmap

OVAL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?

DNS-based on-path attack

DNS attack indicators

DNS poisoning

DNS client cache poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?

Port mirroring

MAC spoofing

ARP poisoning

MAC flooding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Network-based firewall

Host-based firewall

Signature-based IDS

Antivirus scanner

Anomaly-based IDS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?