Which three (3) scenarios are examples of MITB attacks?
Domain 1 - Network Security

Quiz
•
Computers
•
9th Grade
•
Medium
Quizizz Content
Used 11+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker runs SQL statements to infiltrate and change the data in a webpage
An attacker redirects data being sent from a browser to a device of their choosing
An attacker redirects data being sent from a browser to a device of their choosing
An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers manipulate information on servers by running SQL statements?
Man-in-the-middle attack
Brute force attack
Cross-site scripting
SQL injection
Man-in-the-browser attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A rootkit is used to gain which kind of access to a computer without being detected?
Executive
Global
Administrative
Guest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.
Integer, number
Buffer, integer
Integer, integer
Buffer, number
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following malware types causes security breaches that have not yet been identified by credible sources?
Zero day attack
Polymorphica
I’ma Hoax
Logic bomb
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?
Trojan horse
Zero day attack
Worm
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which three (3) scenarios are examples of the correct usage of a logic bomb?
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Unit 1 Teach Cyber Cybersecurity Test Review

Quiz
•
10th Grade
21 questions
Identifying Security Threats

Quiz
•
9th - 12th Grade
25 questions
CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

Quiz
•
12th Grade
24 questions
Revision for Chapter 3

Quiz
•
University
15 questions
Information & Internet Security

Quiz
•
9th - 12th Grade
19 questions
L3 U7 Security and Encryption: Section A (1)

Quiz
•
10th - 12th Grade
20 questions
3A-DDC313-SW5

Quiz
•
University
21 questions
Internet (Part II)

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University