MCyber_Chap3N4

MCyber_Chap3N4

Professional Development

23 Qs

quiz-placeholder

Similar activities

Pretest Scratch

Pretest Scratch

Professional Development

20 Qs

KNT MCQs on Virtual Machines

KNT MCQs on Virtual Machines

Professional Development

20 Qs

Project Retrospectives

Project Retrospectives

Professional Development

20 Qs

React Redux

React Redux

Professional Development

20 Qs

Câu Hỏi Trắc Nghiệm Về iPad và MacBook

Câu Hỏi Trắc Nghiệm Về iPad và MacBook

Professional Development

21 Qs

SDLC2.0 Solution Release Doc -Quiz #1.1

SDLC2.0 Solution Release Doc -Quiz #1.1

Professional Development

24 Qs

Quiz on RAM and Storage Devices

Quiz on RAM and Storage Devices

Professional Development

25 Qs

Quizz Segurança e conformidade AWS

Quizz Segurança e conformidade AWS

Professional Development

25 Qs

MCyber_Chap3N4

MCyber_Chap3N4

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Marcus Phang

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?
TTL
Hop Limit
Address Unreachable
No Route to Destination

Answer explanation

ICMPv6, like IPv4, sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet has expired. However, the IPv6 packet does not have a TTL field. Instead, it uses the Hop Limit field to determine if the packet has expired.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
Port redirection
Trust exploitation
Buffer overflow
Man in the middle

Answer explanation

An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:

1) Password – a dictionary is used for repeated login attempts

2) Trust exploitationuses granted privileges to access unauthorized material

3) Port redirectionuses a compromised internal host to pass traffic through a firewall

4) Man-in-the-middle – an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic

5) Buffer overflow too much data sent to a memory location that already contains data

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
Time-to-Live
Sequence Number
Acknowledgment Number
Differentiated Services

Answer explanation

The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address.

The Differentiated Services (DS) field is used to determine the priority of each packet.

Sequence Number and Acknowledgment Number are two fields in the TCP header.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is involved in an IP address spoofing attack?
A rogue node replies to an ARP request with its own MAC address indicated for the target IP address.
Bogus DHCPDISCOVER messages are sent to consume all the available IP addresses on a DHCP server.
A rogue DHCP server provides false IP configuration parameters to legitimate DHCP clients.
A legitimate network IP address is hijacked by a rogue node.

Answer explanation

In an IP address spoofing attack, the IP address of a legitimate network host is hijacked and used by a rogue node. This allows the rogue node to pose as a valid node on the network.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of attack involves the unauthorized discovery and mapping of network systems and services?
DoS
Reconnaissance
Trust exploitation
Access

Answer explanation

Network reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.

Access attacks and trust exploitation involve unauthorized manipulation of data, access to systems or user privileges.

DoS, or Denial of Service attacks, are intended to prevent legitimate users and devices from accessing network resources.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?
Port scan attack
SYN flood attack
Session hijacking attack
Reset attack

Answer explanation

In a TCP SYN flood attack, the attacker sends to the target host a continuous flood of TCP SYN session requests with a spoofed source IP address.

The target host responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP ACK that will never arrive.

Eventually the target is overwhelmed with half-open TCP connections.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How is optional network layer information carried by IPv6 packets?
Inside an options field that is part of the IPv6 packet header
Inside the Flow Label field
Inside the payload carried by the IPv6 packet
Inside an extension header attached to the main IPv6 packet header

Answer explanation

IPv6 uses extension headers to carry optional network layer information.

Extension headers are not part of the main IPv6 header but are separate headers placed between the IPv6 header and the payload.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?