Domain 1 - Network Security

Domain 1 - Network Security

9th Grade

20 Qs

quiz-placeholder

Similar activities

TIN 11 BÀI 11 KIỂU MẢNG

TIN 11 BÀI 11 KIỂU MẢNG

11th Grade

18 Qs

Quis Internet

Quis Internet

11th Grade

20 Qs

Math and IT - Elimination Round

Math and IT - Elimination Round

10th - 12th Grade

20 Qs

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

IT 101 - Quiz 3

IT 101 - Quiz 3

University

20 Qs

NACOS Kahoot Session II

NACOS Kahoot Session II

University

20 Qs

FTP Server

FTP Server

11th Grade

20 Qs

Domain 1 - Network Security

Domain 1 - Network Security

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Wayground Content

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of MITB attacks?

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker runs SQL statements to infiltrate and change the data in a webpage

An attacker redirects data being sent from a browser to a device of their choosing

An attacker redirects data being sent from a browser to a device of their choosing

An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers manipulate information on servers by running SQL statements?

Man-in-the-middle attack

Brute force attack

       

   Cross-site scripting

SQL injection

      

Man-in-the-browser attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rootkit is used to gain which kind of access to a computer without being detected?

Executive

Global

Administrative

Guest

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.

Integer, number

Buffer, integer

Integer, integer

Buffer, number

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Zero day attack

Polymorphica

I’ma Hoax

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Trojan horse

Zero day attack

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of the correct usage of a logic bomb?

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?