Day 13 Net+

Day 13 Net+

Professional Development

17 Qs

quiz-placeholder

Similar activities

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

Security Domain

Security Domain

Professional Development

20 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Fun Networking

Fun Networking

Professional Development

12 Qs

Komputer jaringan dasar

Komputer jaringan dasar

Professional Development

15 Qs

Day 13 Net+

Day 13 Net+

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Connor Hach

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator observes unusually high traffic to a public web server, with traffic originating from thousands of IP addresses worldwide. The server becomes unresponsive during peak hours.
What kind of attack is likely happening?

VLAN Hopping

MAC Flooding

DDoS Attack

IP Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a new device connects to the network, users complain that they cannot access the internet. A network engineer finds two DHCP servers on the same subnet, and one is giving incorrect default gateways.
What type of threat is this?

Rogue DHCP Server

ARP Spoofing

MAC Flooding

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users report being redirected to fake login pages, even though they typed in the correct website URLs.
The DNS server logs show altered records.
Which attack is this?

ARP Poisoning

DNS Cache Poisoning

Email Spoofing

On-Path Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker gains access to a public Wi-Fi network and begins capturing unencrypted data between users and websites.
Which attack type does this describe?

ARP Spoofing

On-Path Attack

MAC Flooding

Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user clicks a link in an email that looks like it came from the help desk. It redirects to a realistic-looking login page. After entering credentials, they realize it was fake.
What type of attack occurred?

Pharming

DNS Spoofing

Phishing

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker spoofs an IP address to impersonate a trusted device and bypass firewall rules.
What is this technique called?

DNS Poisoning

VLAN Hopping

IP Spoofing

SSL Stripping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a malware that hides deep in the system and provides privileged access to attackers?

Worm

Rootkit

Trojan

Keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?