
CyberOps Modules 24-25
Authored by Logan Prewitt
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
1. Which ICMP message type should be stopped inbound?
source quench
echo-reply
echo
unreachable
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
2. How can IMAP be a security threat to a company?
Someone inadvertently clicks on a hidden iFrame.
Encrypted data is decrypted.
An email can be used to bring malware to a host.
It can be used to encode stolen data and send to a threat actor.
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
3. Which two technologies are primarily used on peer-to-peer networks? (Choose two.)
Bitcoin
BitTorrent
Wireshark
Darknet
Snort
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
4. Which protocol is exploited by cybercriminals who create malicious iFrames?
HTTP
ARP
DHCP
DNS
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
5. Which method is used by some malware to transfer files from infected hosts to a threat actor host?
UDP infiltration
ICMP tunneling
HTTPS traffic encryption
iFrame injection
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
6. Why does HTTPS technology add complexity to network security monitoring?
HTTPS dynamically changes the port number on the web server.
HTTPS uses tunneling technology for confidentiality.
HTTPS hides the true source IP address using NAT/PAT.
HTTPS conceals data traffic through end-to-end encryption.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which approach is intended to prevent exploits that target syslog?
Use a Linux-based server.
Use syslog-ng.
Create an ACL that permits only TCP traffic to the syslog server.
Use a VPN between a syslog client and the syslog server.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
36 questions
PEKAN ULANGAN HARIAN RPL
Quiz
•
12th Grade
30 questions
Quiz sobre Presentaciones
Quiz
•
9th - 12th Grade
35 questions
Robotics Final Exam Study Guide Part II
Quiz
•
9th - 12th Grade
30 questions
Evaluación Excel 6to
Quiz
•
12th Grade
30 questions
Quiz Herramientas TIC
Quiz
•
12th Grade
32 questions
COP NSDA L3= 0006
Quiz
•
12th Grade
40 questions
Grade 6-Sistem Komputer
Quiz
•
6th Grade - University
30 questions
PAS TIK KELAS VII
Quiz
•
8th Grade - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade