
Day 13 Net+
Authored by Connor Hach
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system administrator observes unusually high traffic to a public web server, with traffic originating from thousands of IP addresses worldwide. The server becomes unresponsive during peak hours.
What kind of attack is likely happening?
VLAN Hopping
MAC Flooding
DDoS Attack
IP Spoofing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After a new device connects to the network, users complain that they cannot access the internet. A network engineer finds two DHCP servers on the same subnet, and one is giving incorrect default gateways.
What type of threat is this?
Rogue DHCP Server
ARP Spoofing
MAC Flooding
Phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users report being redirected to fake login pages, even though they typed in the correct website URLs.
The DNS server logs show altered records.
Which attack is this?
ARP Poisoning
DNS Cache Poisoning
Email Spoofing
On-Path Attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker gains access to a public Wi-Fi network and begins capturing unencrypted data between users and websites.
Which attack type does this describe?
ARP Spoofing
On-Path Attack
MAC Flooding
Rootkit
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user clicks a link in an email that looks like it came from the help desk. It redirects to a realistic-looking login page. After entering credentials, they realize it was fake.
What type of attack occurred?
Pharming
DNS Spoofing
Phishing
Social Engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker spoofs an IP address to impersonate a trusted device and bypass firewall rules.
What is this technique called?
DNS Poisoning
VLAN Hopping
IP Spoofing
SSL Stripping
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a malware that hides deep in the system and provides privileged access to attackers?
Worm
Rootkit
Trojan
Keylogger
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Net & Cloud - Session 3 - OSI & TCP/IP
Quiz
•
Professional Development
13 questions
Wirusy komputerowe
Quiz
•
1st Grade - Professio...
20 questions
Aplicaciones WEB
Quiz
•
Professional Development
20 questions
Cloud services
Quiz
•
Professional Development
12 questions
Penilaian Pengetahuan 1 KSK2023
Quiz
•
Professional Development
14 questions
Linux Command Line Quiz
Quiz
•
Professional Development
12 questions
como crear un QR
Quiz
•
Professional Development
18 questions
IT basic test
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development