
ARP Spoofing, SSL & DMZ
Authored by Thalita Vergilio
Computers
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
This protocol is used to resolve MAC addresses against IP addresses.
SSH
ARP
FTP
SSL
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
ARP spoofing is a technique commonly used to perform which type of attack?
brute-force
phishing
man-in-the-middle
SQL injection
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
SSL/TLS communication is...
encrypted
unencrypted
unilateral
client-side only
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which process is depicted in the image?
HTTP request/response
a firewall filtering packets
ARP request/response
SSL/TLS handshake
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which attack is shown in the picture?
DoS
ARP poisoning
phishing
botnet
6.
MULTIPLE CHOICE QUESTION
10 sec • Ungraded
I have completed the module feedback
Yes
No
Not yet, but planning to after the quiz 😉
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is typically deployed in the DMZ?
databases containing sensitive data
web servers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?