PHẦN 3 - 200/280

PHẦN 3 - 200/280

University

79 Qs

quiz-placeholder

Similar activities

KFUPM KFUPM 03 MIDTERM PASSIVE

KFUPM KFUPM 03 MIDTERM PASSIVE

University

80 Qs

Listening

Listening

University

74 Qs

U6-8 Review

U6-8 Review

University

82 Qs

ФКС модуль 1

ФКС модуль 1

University

75 Qs

LONG QUIZ 2A,B,C

LONG QUIZ 2A,B,C

University

81 Qs

business correspondence

business correspondence

University

80 Qs

HS Sem 4 ATKT

HS Sem 4 ATKT

University

80 Qs

EFC 1 REVIEW  Quiz

EFC 1 REVIEW Quiz

University

78 Qs

PHẦN 3 - 200/280

PHẦN 3 - 200/280

Assessment

Quiz

English

University

Medium

Created by

Vy Tường

Used 4+ times

FREE Resource

79 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

the –t instructs the ping utility to keep sending packets until explicitly told.........

stop

to stop

to be stopped

stopped

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

you can do a rather .......... denial of service attack on the system

ancien

primitive

primordial

prime

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In the quarter there were also 12 attacks that ..........as “mega attacks,” peaking at more than 1,000 gigabits per second (Gbps) and 50 million packets per second (Mpps).”

categorized

were categorized

were categorizing

categorize

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DoS có nghĩa là............

[<$>] tấn công từ chối dịch vụ

[<$>] từ chối dịch vụ

[<$>] tấn công dịch vụ từ chối phân tán

[<$>] hệ điều hành đĩa

tấn công từ chối dịch vụ

từ chối dịch vụ

tấn công dịch vụ từ chối phân tán

hệ điều hành đĩa

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is abbreviation of DoS?

disk operating system

denial of service

distributed denial of service

deal of service

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

what do DoS attack aim?

to intrude on your system.

to prevent legitimate users from accessing the system.

To obtain sensitive information.

to destroy your system.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 How does a DoS attack work? 

] will attempt to make an online service or website unavailable by flooding it with unwanted traffic from multiple computers.

overload the system with requests, and it will no longer be able to respond to legitimate users attempting to access the web server.

an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments.

occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?