Search Header Logo

Cengage 8

Authored by Nate undefined

Other

University

Cengage 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack intercepts communications between a web browser and the underlying OS?

MITM

MRTR

MTTR

MITB

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Himari needs to protect against potential attacks on DNS. What are the locations she would need to protect?

Web server buffer and host DNS server

Reply referrer and domain buffer

Web browser and browser add-on

Local host file and external DNS server

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the result of an ARP poisoning attack?

The ARP cache is compromised.

Users cannot reach a DNS server.

MAC addresses are altered.

An internal DNS must be used instead of an external DNS.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Yua has discovered that the network switch is broadcasting all packets to all devices. She suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack would she report?

MAC spoofing attack

MAC cloning attack

MAC flooding attack

MAC overflow attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sakura is explaining to a colleague the different types of DNS attacks. Which DNS attack would only impact a single user?

DNS hijack attack

DNS poisoning attack

DNS overflow attack

DNS resource attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of monitoring methodology looks for statistical deviations from a baseline?

Behavioral monitoring

Signature-based monitoring

Anomaly monitoring

Heuristic monitoring

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ichika suspects that there may be infected devices on the network that are sending regular beacons to a threat actor’s C&C server. Which type of analysis would she use to determine if this is true?

Traffic analysis

Port analysis

Packet analysis

Probe analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?