SD_Ch20

SD_Ch20

9th Grade

30 Qs

quiz-placeholder

Similar activities

IPv6 skuska part1

IPv6 skuska part1

University

25 Qs

Nguyên lí an toàn thông tin 2.

Nguyên lí an toàn thông tin 2.

12th Grade

31 Qs

Quizz de Tecnologia

Quizz de Tecnologia

10th Grade

25 Qs

Ulangan Harian AIJ Kelas XI SMK N 2 Pengasih

Ulangan Harian AIJ Kelas XI SMK N 2 Pengasih

11th Grade

25 Qs

BCS Systems & Architecture Quiz 6

BCS Systems & Architecture Quiz 6

University - Professional Development

30 Qs

MTA Networking Fundamentals Review Part 2

MTA Networking Fundamentals Review Part 2

9th - 12th Grade

25 Qs

Administrsi Infrastruktur Jaringan

Administrsi Infrastruktur Jaringan

11th Grade

30 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

SD_Ch20

SD_Ch20

Assessment

Quiz

Instructional Technology

9th Grade

Medium

Created by

Dalia Pulido

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a technology-based attack?

DoS

Rogue

DHCP

Shoulder surfing

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A command-and-control server is a part of which of the following attacks?

DDoS

Password attacks

Shoulder surfing

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves the attacker impersonating both sides of a conversation between two hosts?

On-path attack

Deauthentication

DoS

Spoofing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will attempt to configure hosts with a malicious default gateway?

DoS

VLAN hopping

Deauthentication

Rogue DHCP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following does the attacker (and his bots) send a UDP packet to vulnerable NTP servers that requests that a large amount of data (megabytes worth of traffic) be sent to the DDoS's target IP address?

Distributed

NTP amplification

Reflective

DNS amplification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following was previously known as a man-in-the-middle attack?

VLAN hopping

On-path attack

DoS attack

Deauthentication attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Double tagging is a part of which of the following attacks?

VLAN hopping

On-path attack

DDoS

Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?