Network Attacks and Security

Network Attacks and Security

11th - 12th Grade

12 Qs

quiz-placeholder

Similar activities

Maintaining Computer Systems

Maintaining Computer Systems

12th Grade

8 Qs

SASIS DAN SISTEM PEMINDAH TENAGA

SASIS DAN SISTEM PEMINDAH TENAGA

11th Grade

15 Qs

Unit Differential

Unit Differential

11th - 12th Grade

10 Qs

Nail Art Techniques

Nail Art Techniques

9th - 12th Grade

10 Qs

SCIENCE, TECHNOLOGY AND DEVELOPMENT

SCIENCE, TECHNOLOGY AND DEVELOPMENT

8th Grade - University

15 Qs

Preschool/School Age Development Quiz

Preschool/School Age Development Quiz

9th - 12th Grade

10 Qs

Chapter 3 - Feeling Messages: Following our EGS

Chapter 3 - Feeling Messages: Following our EGS

KG - University

9 Qs

Kuis Pengembangan Web

Kuis Pengembangan Web

12th Grade

15 Qs

Network Attacks and Security

Network Attacks and Security

Assessment

Quiz

Education

11th - 12th Grade

Medium

Created by

Hy Fernz

Used 58+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. ARP poisoning is a technique used to:

a. Overwhelm a target server with ICMP ping packers causing a DOS attack.

b. Install malware on victim machines transforming them into zombie agents.

c. Overwhelm a target server with ACK packers exploiting the nature of the 3 way handshake.

d. Alter the MAC address of a computer’s ARP cache so that traffic is directed to a man-in-the-middle instead of the intended destination such as an internet router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is TRUE with regards to the SMURF Flood attack

a. The attacker utilizes large volumes of SYN packets in order to flood the server.

b. The attacker sends an ARP broadcast packet in order to flood the server with ACK packets.

c. With the help of other computers, the attacker floods the server with ping requests.

d. With the help of other computers, the attacker floods the server with ping replies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following elements is most likely to be an issue for Ping flood?

a. Confidentiality

b. Integrity

c. Availability

d. Non-repudiation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following is a technique to mask the source IP address of a network attack?

a. DDoS

b. Replay

c. Sniffing

d. Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following malware is MOST LIKELY used by attackers to carry out Distributed Denial of Services (DDOS) attacks?

a. Trojan.

b. Rootkit

c. Botnet.

d. Adware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statement about IP spoofing is TRUE?

a. The destination IP address of the network packet is changed to another IP address.

b. The source MAC address of the network packet is changed to the hacker’s MAC address.

c. The destination MAC address of the network packet is changed to the hacker’s MAC address.

d. The source IP address of the network packet is changed to another IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes differential backup?

A. A differential backup backs up all the information on the disk to an offline device such as tape.

B. A differential backup backs up only the information that is added since previous differential backup.

C. A differential backup backs up only the information that is added since last full backup.

D. A differential backup backs up only the information that is added since last incremental backup.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?