POST-TEST DAY 3

POST-TEST DAY 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

[PRAKOM] MANRISK

[PRAKOM] MANRISK

Professional Development

10 Qs

NFCM Tech Night Quiz

NFCM Tech Night Quiz

Professional Development

13 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

Sprint Planning Quiz

Sprint Planning Quiz

Professional Development

10 Qs

CloudRaya Webinar IaC Quiz

CloudRaya Webinar IaC Quiz

Professional Development

10 Qs

OXORD Quiz on Online Orientation

OXORD Quiz on Online Orientation

Professional Development

11 Qs

EarleandWilson_TC_223052025

EarleandWilson_TC_223052025

Professional Development

11 Qs

Data Analysis and Visualization

Data Analysis and Visualization

Professional Development

15 Qs

POST-TEST DAY 3

POST-TEST DAY 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

Nurcholis Majid

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John is a pen tester working with an information security consultant based in Paris. As part of a penetration testing assignment, he was asked to perform wireless penetration testing for a large MNC. John knows that the company provides free Wi-Fi access to its employees on the company premises. He sets up a rogue wireless access point with the same SSID as that of the company’s Wi-Fi network just outside the company premises. He sets up this rogue access point using the tools that he has and hopes that the employees might connect to it. What type of wireless confidentiality attack is John trying to do?

KRACK Attack

WEP Cracking

Evil Twin AP

War Driving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Encryption technique is used in WPA?

DES

AES

TKIP

RSA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a mobile platform risk?

Malicious Apps in App Store

Sandboxing

Jailbreaking and Rooting

Mobile Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 

James, an attacker, attempted to gain illegitimate access to a user’s bank account. To achieve his goal, James tricked mobile phone sellers into providing PII of the target user and exploited the instant message service on the user’s device, which helped him reset the password and access the victim’s account.

Identify the type of attack performed by James in the above scenario.

Brute-force attack

Cross-site request forgery

OTP hijacking

DNS poisoning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?

Mobile

Network

Application

Cloud

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following Nmap commands is used by an attacker to identify the IPv6 capabilities of a target IoT device?

nmap -n -Pn -sS -pT:0-65535 -v -A -oX <Name> <IP>

nmap -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>

nmap -p 80,81,8080,8081 <Target IP address range>

nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following levels of the Purdue model can the analysis and alteration of the physical process be performed?

Level 2

Level 3

Level 1

Level 0

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?