
Domain 1 - Network Security
Authored by Wayground Content
Computers
9th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which three (3) scenarios are examples of MITB attacks?
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker runs SQL statements to infiltrate and change the data in a webpage
An attacker redirects data being sent from a browser to a device of their choosing
An attacker redirects data being sent from a browser to a device of their choosing
An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers manipulate information on servers by running SQL statements?
Man-in-the-middle attack
Brute force attack
Cross-site scripting
SQL injection
Man-in-the-browser attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A rootkit is used to gain which kind of access to a computer without being detected?
Executive
Global
Administrative
Guest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.
Integer, number
Buffer, integer
Integer, integer
Buffer, number
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following malware types causes security breaches that have not yet been identified by credible sources?
Zero day attack
Polymorphica
I’ma Hoax
Logic bomb
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?
Trojan horse
Zero day attack
Worm
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which three (3) scenarios are examples of the correct usage of a logic bomb?
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?