SD_Ch20

SD_Ch20

9th Grade

30 Qs

quiz-placeholder

Similar activities

Ulangan Harian AIJ Kelas XI SMK N 2 Pengasih

Ulangan Harian AIJ Kelas XI SMK N 2 Pengasih

11th Grade

25 Qs

BCS Systems & Architecture Quiz 6

BCS Systems & Architecture Quiz 6

University - Professional Development

30 Qs

MTA Networking Fundamentals Review Part 2

MTA Networking Fundamentals Review Part 2

9th - 12th Grade

25 Qs

Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

9th - 12th Grade

25 Qs

Administrsi Infrastruktur Jaringan

Administrsi Infrastruktur Jaringan

11th Grade

30 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

PKPJ XI ACP

PKPJ XI ACP

12th Grade

25 Qs

IPv6 skuska part1

IPv6 skuska part1

University

25 Qs

SD_Ch20

SD_Ch20

Assessment

Quiz

Instructional Technology

9th Grade

Medium

Created by

Dalia Pulido

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a technology-based attack?

DoS

Rogue

DHCP

Shoulder surfing

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A command-and-control server is a part of which of the following attacks?

DDoS

Password attacks

Shoulder surfing

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves the attacker impersonating both sides of a conversation between two hosts?

On-path attack

Deauthentication

DoS

Spoofing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack will attempt to configure hosts with a malicious default gateway?

DoS

VLAN hopping

Deauthentication

Rogue DHCP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following does the attacker (and his bots) send a UDP packet to vulnerable NTP servers that requests that a large amount of data (megabytes worth of traffic) be sent to the DDoS's target IP address?

Distributed

NTP amplification

Reflective

DNS amplification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following was previously known as a man-in-the-middle attack?

VLAN hopping

On-path attack

DoS attack

Deauthentication attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Double tagging is a part of which of the following attacks?

VLAN hopping

On-path attack

DDoS

Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?