Search Header Logo

Domain 1 - Network Security

Authored by Wayground Content

Computers

9th Grade

Used 11+ times

Domain 1 - Network Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of MITB attacks?

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker runs SQL statements to infiltrate and change the data in a webpage

An attacker redirects data being sent from a browser to a device of their choosing

An attacker redirects data being sent from a browser to a device of their choosing

An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers manipulate information on servers by running SQL statements?

Man-in-the-middle attack

Brute force attack

       

   Cross-site scripting

SQL injection

      

Man-in-the-browser attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rootkit is used to gain which kind of access to a computer without being detected?

Executive

Global

Administrative

Guest

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.

Integer, number

Buffer, integer

Integer, integer

Buffer, number

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Zero day attack

Polymorphica

I’ma Hoax

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Trojan horse

Zero day attack

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of the correct usage of a logic bomb?

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?