Search Header Logo

Day 13 Net+

Authored by Connor Hach

Computers

Professional Development

Used 2+ times

Day 13 Net+
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator observes unusually high traffic to a public web server, with traffic originating from thousands of IP addresses worldwide. The server becomes unresponsive during peak hours.
What kind of attack is likely happening?

VLAN Hopping

MAC Flooding

DDoS Attack

IP Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a new device connects to the network, users complain that they cannot access the internet. A network engineer finds two DHCP servers on the same subnet, and one is giving incorrect default gateways.
What type of threat is this?

Rogue DHCP Server

ARP Spoofing

MAC Flooding

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users report being redirected to fake login pages, even though they typed in the correct website URLs.
The DNS server logs show altered records.
Which attack is this?

ARP Poisoning

DNS Cache Poisoning

Email Spoofing

On-Path Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker gains access to a public Wi-Fi network and begins capturing unencrypted data between users and websites.
Which attack type does this describe?

ARP Spoofing

On-Path Attack

MAC Flooding

Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user clicks a link in an email that looks like it came from the help desk. It redirects to a realistic-looking login page. After entering credentials, they realize it was fake.
What type of attack occurred?

Pharming

DNS Spoofing

Phishing

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker spoofs an IP address to impersonate a trusted device and bypass firewall rules.
What is this technique called?

DNS Poisoning

VLAN Hopping

IP Spoofing

SSL Stripping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a malware that hides deep in the system and provides privileged access to attackers?

Worm

Rootkit

Trojan

Keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?