Technologies and Protocols Quiz

Technologies and Protocols Quiz

University

38 Qs

quiz-placeholder

Similar activities

Culture Awareness

Culture Awareness

University

35 Qs

Health Promotion: Conducting a Needs Assessment

Health Promotion: Conducting a Needs Assessment

University

39 Qs

Summit 1 - U9 - Preview

Summit 1 - U9 - Preview

University

34 Qs

Examination  of Introduction to Information Technology

Examination of Introduction to Information Technology

University

35 Qs

Machine Shorthand Quiz 2

Machine Shorthand Quiz 2

University

40 Qs

Company Law

Company Law

12th Grade - University

35 Qs

CFC Teller 20 Desember 2024

CFC Teller 20 Desember 2024

1st Grade - University

33 Qs

Crystal structure and defect

Crystal structure and defect

University

40 Qs

Technologies and Protocols Quiz

Technologies and Protocols Quiz

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

NoBS NoBS

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do cybercriminals make use of a malicious iFrame?

The iFrame allows the browser to load a web page from another source.

The attacker embeds malicious content in business appropriate files.

The attacker redirects traffic to an incorrect DNS server.

The iFrame allows multiple DNS subdomains to be used.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?

HTTPS traffic is much faster than HTTP traffic.

HTTPS traffic enables end-to-end encryption.

HTTPS traffic does not require authentication.

HTTPS traffic can carry a much larger data payload than HTTP can carry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

SNMP

NetFlow

syslog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

SSH

NTP

syslog

AAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

69

123

443

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of server can threat actors use DNS to communicate with?

CnC

database

NTP

web

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?