Resiliency and Site Security

Quiz
•
Computers
•
9th Grade
•
Medium
Carlos Sowell
Used 7+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Keypad locks
Smart card
Proximity card
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Password sniffing
Brute force attack
Keylogger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which passive reconnaissance tool is used to gather information from a variety of public sources?
theHarvester
scanless
Shodan
Packet sniffing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
Nessus
Wireshark
nmap
OVAL
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?
DNS-based on-path attack
DNS attack indicators
DNS poisoning
DNS client cache poisoning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?
Port mirroring
MAC spoofing
ARP poisoning
MAC flooding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Network-based firewall
Host-based firewall
Signature-based IDS
Antivirus scanner
Anomaly-based IDS
Create a free account and access millions of resources
Similar Resources on Wayground
21 questions
L3: Understanding Security Policies

Quiz
•
9th - 12th Grade
20 questions
IGCSE ICT: Networking 1

Quiz
•
9th - 10th Grade
20 questions
Networks

Quiz
•
9th Grade
20 questions
BTEC IT Revision Quiz 2 (various topics)

Quiz
•
8th - 11th Grade
20 questions
Understanding Security Concepts Quiz

Quiz
•
12th Grade
20 questions
BAB 11

Quiz
•
University
20 questions
Network+ Networking Fundamentals Review

Quiz
•
University
20 questions
Network Security

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
19 questions
Mental Health Vocabulary Pre-test

Quiz
•
9th Grade
14 questions
Points, Lines, Planes

Quiz
•
9th Grade