Technologies and Protocols Quiz

Technologies and Protocols Quiz

University

38 Qs

quiz-placeholder

Similar activities

Chapter 6: Legal Aspects of Police

Chapter 6: Legal Aspects of Police

12th Grade - University

39 Qs

SATELLITE COMMUNICATION MCQs-I

SATELLITE COMMUNICATION MCQs-I

University

40 Qs

LEA 4123 (FEB-MAY 24)

LEA 4123 (FEB-MAY 24)

University

36 Qs

Motivation Theories

Motivation Theories

University

38 Qs

Legal Aspects of Business

Legal Aspects of Business

KG - University

34 Qs

FNAF

FNAF

6th Grade - University

36 Qs

Translation 3 Abbreviations

Translation 3 Abbreviations

University

36 Qs

Ulangan Proxy

Ulangan Proxy

University

35 Qs

Technologies and Protocols Quiz

Technologies and Protocols Quiz

Assessment

Quiz

Other

University

Easy

Created by

NoBS NoBS

Used 1+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do cybercriminals make use of a malicious iFrame?

The iFrame allows the browser to load a web page from another source.

The attacker embeds malicious content in business appropriate files.

The attacker redirects traffic to an incorrect DNS server.

The iFrame allows multiple DNS subdomains to be used.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?

HTTPS traffic is much faster than HTTP traffic.

HTTPS traffic enables end-to-end encryption.

HTTPS traffic does not require authentication.

HTTPS traffic can carry a much larger data payload than HTTP can carry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

SNMP

NetFlow

syslog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

SSH

NTP

syslog

AAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

69

123

443

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of server can threat actors use DNS to communicate with?

CnC

database

NTP

web

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?