What is "achieved either through the placement of a monitoring device informally known as a bug on the wire in question or through built-in mechanisms in other communication technologies?"
A2 Computer Network-based Threats

Quiz
•
Computers
•
12th Grade
•
Medium
Barry Wright
Used 14+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wiretapping
Port Scanning
Idle Scanning
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "is a method of determining which ports on a network are open and could be receiving or sending data?"
Wiretapping
Port Scanning
Idle Scanning
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is "a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is accomplished by impersonating another computer whose network traffic is very slow or nonexistent (that is, not transmitting or receiving information)?"
Wiretapping
Port Scanning
Idle Scanning
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "is an attack meant to shut down a machine or network, making it inaccessible to its intended users?"
Denial-of-Service
Spoofing
Man in the Middle
Address Resolution Protocol (ARP) Poisoning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage?"
Denial-of-Service
Spoofing
Man in the Middle
Address Resolution Protocol (ARP) Poisoning
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What "is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties?"
Denial-of-Service
Spoofing
Man in the Middle
Address Resolution Protocol (ARP) Poisoning
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What "is a type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table?"
Denial-of-Service
Spoofing
Man in the Middle
Address Resolution Protocol (ARP) Poisoning
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Digital Communication II

Quiz
•
5th Grade - University
15 questions
OSI Layers

Quiz
•
9th - 12th Grade
10 questions
โปรโตคอลในการสื่อสารข้อมูลและ มาตรฐาน IEEE หน่วยที่ 3

Quiz
•
10th - 12th Grade
15 questions
Cisco 2, Module 11

Quiz
•
12th Grade
10 questions
Found. of IT: Security Threats - B

Quiz
•
9th - 12th Grade
10 questions
Cybersecurity Attack Types Quiz

Quiz
•
5th Grade - University
15 questions
The dangers of computer crime

Quiz
•
12th Grade
7 questions
Computer Crime

Quiz
•
10th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University