Technologies and Protocols Quiz

Technologies and Protocols Quiz

University

38 Qs

quiz-placeholder

Similar activities

The TREASURE Effect Quiz

The TREASURE Effect Quiz

4th Grade - Professional Development

35 Qs

Jurisprudence Ch 1 & 2

Jurisprudence Ch 1 & 2

University

40 Qs

ETC 605

ETC 605

University

40 Qs

Enviro Sci Review 2

Enviro Sci Review 2

KG - University

35 Qs

Reading D End of Semester Exam

Reading D End of Semester Exam

University

35 Qs

May 18-MMA Sprng Final Rvw

May 18-MMA Sprng Final Rvw

6th Grade - University

33 Qs

LearnTube Design UI/UX Quiz 9/3/23

LearnTube Design UI/UX Quiz 9/3/23

University

35 Qs

Mobile E-Learning Quiz

Mobile E-Learning Quiz

University

35 Qs

Technologies and Protocols Quiz

Technologies and Protocols Quiz

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

NoBS NoBS

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do cybercriminals make use of a malicious iFrame?

The iFrame allows the browser to load a web page from another source.

The attacker embeds malicious content in business appropriate files.

The attacker redirects traffic to an incorrect DNS server.

The iFrame allows multiple DNS subdomains to be used.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?

HTTPS traffic is much faster than HTTP traffic.

HTTPS traffic enables end-to-end encryption.

HTTPS traffic does not require authentication.

HTTPS traffic can carry a much larger data payload than HTTP can carry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

SNMP

NetFlow

syslog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

SSH

NTP

syslog

AAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

69

123

443

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of server can threat actors use DNS to communicate with?

CnC

database

NTP

web

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?