
MCyber_Chap3N4
Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Marcus Phang
FREE Resource
Enhance your content in a minute
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
ICMPv6, like IPv4, sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet has expired. However, the IPv6 packet does not have a TTL field. Instead, it uses the Hop Limit field to determine if the packet has expired.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:
1) Password – a dictionary is used for repeated login attempts
2) Trust exploitation – uses granted privileges to access unauthorized material
3) Port redirection – uses a compromised internal host to pass traffic through a firewall
4) Man-in-the-middle – an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic
5) Buffer overflow – too much data sent to a memory location that already contains data
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address.
The Differentiated Services (DS) field is used to determine the priority of each packet.
Sequence Number and Acknowledgment Number are two fields in the TCP header.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Network reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems.
Access attacks and trust exploitation involve unauthorized manipulation of data, access to systems or user privileges.
DoS, or Denial of Service attacks, are intended to prevent legitimate users and devices from accessing network resources.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
In a TCP SYN flood attack, the attacker sends to the target host a continuous flood of TCP SYN session requests with a spoofed source IP address.
The target host responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP ACK that will never arrive.
Eventually the target is overwhelmed with half-open TCP connections.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
IPv6 uses extension headers to carry optional network layer information.
Extension headers are not part of the main IPv6 header but are separate headers placed between the IPv6 header and the payload.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Máy in, Máy Scan và Máy Photocopy
Quiz
•
Professional Development
20 questions
Understanding HTML
Quiz
•
Professional Development
18 questions
Java 總複習
Quiz
•
Professional Development
20 questions
Spring Data JPA
Quiz
•
Professional Development
20 questions
ITC 101 OCTAL AND HEXA
Quiz
•
Professional Development
20 questions
DCSMAT-DataStructures-Condititonal-iterative
Quiz
•
Professional Development
20 questions
Python Data Structures and loops
Quiz
•
Professional Development
20 questions
Software Testing Fundamentals
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Halloween
Quiz
•
Professional Development
16 questions
Spooky Season Quiz
Quiz
•
Professional Development
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
50 questions
ASL Colors and Clothes
Quiz
•
KG - Professional Dev...
15 questions
Ohms Law
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
