
POST-TEST DAY 3

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Nurcholis Majid
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John is a pen tester working with an information security consultant based in Paris. As part of a penetration testing assignment, he was asked to perform wireless penetration testing for a large MNC. John knows that the company provides free Wi-Fi access to its employees on the company premises. He sets up a rogue wireless access point with the same SSID as that of the company’s Wi-Fi network just outside the company premises. He sets up this rogue access point using the tools that he has and hopes that the employees might connect to it. What type of wireless confidentiality attack is John trying to do?
KRACK Attack
WEP Cracking
Evil Twin AP
War Driving
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following Encryption technique is used in WPA?
DES
AES
TKIP
RSA
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a mobile platform risk?
Malicious Apps in App Store
Sandboxing
Jailbreaking and Rooting
Mobile Malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, an attacker, attempted to gain illegitimate access to a user’s bank account. To achieve his goal, James tricked mobile phone sellers into providing PII of the target user and exploited the instant message service on the user’s device, which helped him reset the password and access the victim’s account.
Identify the type of attack performed by James in the above scenario.
Brute-force attack
Cross-site request forgery
OTP hijacking
DNS poisoning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?
Mobile
Network
Application
Cloud
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following Nmap commands is used by an attacker to identify the IPv6 capabilities of a target IoT device?
nmap -n -Pn -sS -pT:0-65535 -v -A -oX <Name> <IP>
nmap -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>
nmap -p 80,81,8080,8081 <Target IP address range>
nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following levels of the Purdue model can the analysis and alteration of the physical process be performed?
Level 2
Level 3
Level 1
Level 0
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
NETWORKING SESSION ASSESSMENT

Quiz
•
Professional Development
5 questions
SAP Cloud Connector Quiz

Quiz
•
Professional Development
11 questions
Ingestion

Quiz
•
Professional Development
10 questions
Ethical Hacking Kali Linux Part 6

Quiz
•
Professional Development
6 questions
OSS Security

Quiz
•
Professional Development
14 questions
Understanding Cloud Computing Models

Quiz
•
Professional Development
10 questions
เกมความรู้ด้านไซเบอร์ ชุดที่ 1

Quiz
•
Professional Development
10 questions
Cuestionario sobre Disponibilidad de Contenidos en la Nube

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade