
Technologies and Protocols Quiz
Authored by NoBS NoBS
Other
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
38 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do cybercriminals make use of a malicious iFrame?
The iFrame allows the browser to load a web page from another source.
The attacker embeds malicious content in business appropriate files.
The attacker redirects traffic to an incorrect DNS server.
The iFrame allows multiple DNS subdomains to be used.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?
HTTPS traffic is much faster than HTTP traffic.
HTTPS traffic enables end-to-end encryption.
HTTPS traffic does not require authentication.
HTTPS traffic can carry a much larger data payload than HTTP can carry.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which network service synchronizes the time across all devices on the network?
NTP
SNMP
NetFlow
syslog
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of server daemon accepts messages sent by network devices to create a collection of log entries?
SSH
NTP
syslog
AAA
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What port number would be used if a threat actor was using NTP to direct DDoS attacks?
25
69
123
443
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?
HTTP
POP3
SMTP
IMAP4
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of server can threat actors use DNS to communicate with?
CnC
database
NTP
web
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?