blah

blah

University

7 Qs

quiz-placeholder

Similar activities

Pentest Giriş

Pentest Giriş

University

10 Qs

ADMINISTRASI INFRASTRUKTUR JARINGAN (XI TKJ)

ADMINISTRASI INFRASTRUKTUR JARINGAN (XI TKJ)

University

10 Qs

TheNotebook Walkthrough

TheNotebook Walkthrough

University

5 Qs

chap11

chap11

University

11 Qs

Network Security

Network Security

University

10 Qs

TERMS OF DATABASE

TERMS OF DATABASE

4th Grade - University

10 Qs

Cybersecurity Quiz (NeoCyber Discord)

Cybersecurity Quiz (NeoCyber Discord)

9th Grade - University

12 Qs

Jarkom

Jarkom

University

10 Qs

blah

blah

Assessment

Quiz

Instructional Technology

University

Easy

Created by

Shaun Matthews

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 10 pts

What kind of threat is described when a threat actor overloads a network to deny other users network access?​ ​ (a)  

Disruption of service
Data loss
Manipulation
Identity theft
Information theft

2.

CLASSIFICATION QUESTION

3 mins • 20 pts

Place the terms under the correct category heading

Groups:

(a) Worms

,

(b) Viruses

,

(c) Phishing

Frequently used as umbrella term for many forms of malicious software

software that masquerades as harmless

application but includes malware

Usually uses fake email and / or website

Code that attaches itself to host,

replicates and at some stage executes payload

At some stage deliver payload (often malicious code)

Exploit network-based vulnerabilities to spread

Attempt to trick victim into providing sensitive information

able to exist and spread without host

3.

DROPDOWN QUESTION

30 sec • 10 pts

SQL ​ (a)   attacks involve inserting anomalous text into web page input fields to alter ​ (b)   executed in the Database backend. Often used to circumvent authentication or access database records.

injection
SQL queries
Replacement
insertion
SQL commands

4.

DROPDOWN QUESTION

30 sec • 10 pts

Three primary principles and goals used in security are ​ (a)   , ​ ​ (b)   and ​ (c)  

Confidentiality
Integrity
Availability
Sensitive
Honesty
accessibility

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

AAA Server

ESA/WSA

IPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of attack may involve the use of tools such as nslookup and fping?

access attacks

worm attack

denial of service attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

TCP usage

authorization

connections via multiple VTY lines