blah

blah

University

7 Qs

quiz-placeholder

Similar activities

Herramientas Digitales en la NUBE

Herramientas Digitales en la NUBE

University

7 Qs

ED 685 Ch. 4 Quiz

ED 685 Ch. 4 Quiz

University

10 Qs

Actividad de Retroalimentación U2

Actividad de Retroalimentación U2

University

4 Qs

Quiz Basis Data Overview

Quiz Basis Data Overview

University

11 Qs

 Bài thực hành 1

Bài thực hành 1

University

10 Qs

Conceptos de Bases de datos

Conceptos de Bases de datos

University

10 Qs

What I Must Know to Survive NUS

What I Must Know to Survive NUS

University

12 Qs

Web Pentest

Web Pentest

University

11 Qs

blah

blah

Assessment

Quiz

Instructional Technology

University

Easy

Created by

Shaun Matthews

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 10 pts

What kind of threat is described when a threat actor overloads a network to deny other users network access?​ ​ (a)  

Disruption of service
Data loss
Manipulation
Identity theft
Information theft

2.

CLASSIFICATION QUESTION

3 mins • 20 pts

Place the terms under the correct category heading

Groups:

(a) Worms

,

(b) Viruses

,

(c) Phishing

Exploit network-based vulnerabilities to spread

Attempt to trick victim into providing sensitive information

Frequently used as umbrella term for many forms of malicious software

At some stage deliver payload (often malicious code)

Usually uses fake email and / or website

Code that attaches itself to host,

replicates and at some stage executes payload

able to exist and spread without host

software that masquerades as harmless

application but includes malware

3.

DROPDOWN QUESTION

30 sec • 10 pts

SQL ​ (a)   attacks involve inserting anomalous text into web page input fields to alter ​ (b)   executed in the Database backend. Often used to circumvent authentication or access database records.

injection
SQL queries
Replacement
insertion
SQL commands

4.

DROPDOWN QUESTION

30 sec • 10 pts

Three primary principles and goals used in security are ​ (a)   , ​ ​ (b)   and ​ (c)  

Confidentiality
Integrity
Availability
Sensitive
Honesty
accessibility

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

AAA Server

ESA/WSA

IPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of attack may involve the use of tools such as nslookup and fping?

access attacks

worm attack

denial of service attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

TCP usage

authorization

connections via multiple VTY lines

Discover more resources for Instructional Technology