POST-TEST DAY 3

POST-TEST DAY 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Day 3 - ITSEC CyberSecurity Summit 2025 Lunch Break

Day 3 - ITSEC CyberSecurity Summit 2025 Lunch Break

Professional Development

6 Qs

Tech Experts 05

Tech Experts 05

Professional Development

14 Qs

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

CMMS

CMMS

Professional Development

10 Qs

Pengenalan Teknologi Informasi

Pengenalan Teknologi Informasi

Professional Development

10 Qs

MENS 12 September 2024

MENS 12 September 2024

Professional Development

10 Qs

Exploring Information Technology Concepts

Exploring Information Technology Concepts

Professional Development

13 Qs

POST-TEST DAY 3

POST-TEST DAY 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Nurcholis Majid

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John is a pen tester working with an information security consultant based in Paris. As part of a penetration testing assignment, he was asked to perform wireless penetration testing for a large MNC. John knows that the company provides free Wi-Fi access to its employees on the company premises. He sets up a rogue wireless access point with the same SSID as that of the company’s Wi-Fi network just outside the company premises. He sets up this rogue access point using the tools that he has and hopes that the employees might connect to it. What type of wireless confidentiality attack is John trying to do?

KRACK Attack

WEP Cracking

Evil Twin AP

War Driving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Encryption technique is used in WPA?

DES

AES

TKIP

RSA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a mobile platform risk?

Malicious Apps in App Store

Sandboxing

Jailbreaking and Rooting

Mobile Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 

James, an attacker, attempted to gain illegitimate access to a user’s bank account. To achieve his goal, James tricked mobile phone sellers into providing PII of the target user and exploited the instant message service on the user’s device, which helped him reset the password and access the victim’s account.

Identify the type of attack performed by James in the above scenario.

Brute-force attack

Cross-site request forgery

OTP hijacking

DNS poisoning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?

Mobile

Network

Application

Cloud

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following Nmap commands is used by an attacker to identify the IPv6 capabilities of a target IoT device?

nmap -n -Pn -sS -pT:0-65535 -v -A -oX <Name> <IP>

nmap -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>

nmap -p 80,81,8080,8081 <Target IP address range>

nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following levels of the Purdue model can the analysis and alteration of the physical process be performed?

Level 2

Level 3

Level 1

Level 0

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?