Log Analysis Mini-Challenge

Log Analysis Mini-Challenge

University

20 Qs

quiz-placeholder

Similar activities

Cyber Crime

Cyber Crime

University

20 Qs

LITERACIES in the 21st Century

LITERACIES in the 21st Century

University

20 Qs

Hamm Os

Hamm Os

6th Grade - University

16 Qs

Final Exam--Educ 6

Final Exam--Educ 6

University

20 Qs

UTS KSP APLIKASI KOMPUTER_FARMASI

UTS KSP APLIKASI KOMPUTER_FARMASI

University

20 Qs

G Suite for Education Overview

G Suite for Education Overview

University

20 Qs

Tin học 4- Ôn tập HK2 (24-25)

Tin học 4- Ôn tập HK2 (24-25)

5th Grade - University

20 Qs

Bài 7: TRÌNH BÀY VÀ IN TRANG TÍNH

Bài 7: TRÌNH BÀY VÀ IN TRANG TÍNH

10th Grade - University

16 Qs

Log Analysis Mini-Challenge

Log Analysis Mini-Challenge

Assessment

Quiz

Instructional Technology

University

Practice Problem

Hard

Created by

Santhosh Thangaseelan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of attack is shown in the log?

SQL Injection

Cross-site Scripting

Brute Force

Session Hijacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does HTTP status code 401 mean?

Forbidden

Unauthorized

OK

Not Found

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which IP address appears suspicious in the log?

Which IP address appears suspicious in the log?

127.0.0.1

192.168.0.5

172.16.0.10

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a common defense against brute-force attacks?

Account lockout

Captcha skipping

Allow multiple attempts

Port forwarding

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

How many failed login attempts are shown before success?

2

1

3

4

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of attack is being attempted?

Directory Traversal

  • Denial of Service

CSRF

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which file is commonly targeted in Unix-based systems?

/root/file.txt

/bin/bash

/etc/passwd

/dev/null

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?