
SD_Ch20
Authored by Dalia Pulido
Instructional Technology
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a technology-based attack?
DoS
Rogue
DHCP
Shoulder surfing
Malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A command-and-control server is a part of which of the following attacks?
DDoS
Password attacks
Shoulder surfing
Malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves the attacker impersonating both sides of a conversation between two hosts?
On-path attack
Deauthentication
DoS
Spoofing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack will attempt to configure hosts with a malicious default gateway?
DoS
VLAN hopping
Deauthentication
Rogue DHCP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following does the attacker (and his bots) send a UDP packet to vulnerable NTP servers that requests that a large amount of data (megabytes worth of traffic) be sent to the DDoS's target IP address?
Distributed
NTP amplification
Reflective
DNS amplification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following was previously known as a man-in-the-middle attack?
VLAN hopping
On-path attack
DoS attack
Deauthentication attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Double tagging is a part of which of the following attacks?
VLAN hopping
On-path attack
DDoS
Malware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?