Domain 1 - Network Security

Domain 1 - Network Security

9th Grade

20 Qs

quiz-placeholder

Similar activities

Chapter 2- Malicious Code

Chapter 2- Malicious Code

University

15 Qs

Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

Midterm Review 4

Midterm Review 4

11th Grade

15 Qs

Information & Internet Security

Information & Internet Security

9th - 12th Grade

15 Qs

Network Attacks

Network Attacks

9th - 12th Grade

15 Qs

L3 U7 Security and Encryption: Section A (1)

L3 U7 Security and Encryption: Section A (1)

10th - 12th Grade

19 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

Domain 1 - Network Security

Domain 1 - Network Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Quizizz Content

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of MITB attacks?

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker runs SQL statements to infiltrate and change the data in a webpage

An attacker redirects data being sent from a browser to a device of their choosing

An attacker redirects data being sent from a browser to a device of their choosing

An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers manipulate information on servers by running SQL statements?

Man-in-the-middle attack

Brute force attack

       

   Cross-site scripting

SQL injection

      

Man-in-the-browser attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rootkit is used to gain which kind of access to a computer without being detected?

Executive

Global

Administrative

Guest

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.

Integer, number

Buffer, integer

Integer, integer

Buffer, number

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Zero day attack

Polymorphica

I’ma Hoax

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Trojan horse

Zero day attack

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of the correct usage of a logic bomb?

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?