ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

quiz-placeholder

Similar activities

IP Addressing

IP Addressing

10th Grade - Professional Development

15 Qs

Net-215 MidTerm Review

Net-215 MidTerm Review

University

9 Qs

QUIZ

QUIZ

University

10 Qs

chapter 3 - Network & Security Overview

chapter 3 - Network & Security Overview

University

13 Qs

RandonQuestionRoutingChapter10

RandonQuestionRoutingChapter10

University

12 Qs

CCNA Network Attack Mitigations

CCNA Network Attack Mitigations

University

10 Qs

ITE205 Chap 11

ITE205 Chap 11

University

5 Qs

IoT - การบรรยายครั้งที่ 6

IoT - การบรรยายครั้งที่ 6

University

10 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

Assessment

Quiz

Computers

University

Hard

Created by

Sreng Vichet

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a TCP/IP attack?

A cyber attack targeting the TCP/IP protocol suite

A software bug in the TCP/IP protocol

A physical attack on computer hardware

A marketing campaign for a new TCP/IP product

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves flooding a network with traffic to make it unavailable to its intended users?

Denial of Service (DoS) attack

Phishing attack

Malware attack

Spyware attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves intercepting communication between two parties to steal information?

Man-in-the-Middle

Behind-the-Back attack

Front-and-Center attack

Side-by-Side attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves sending a large number of connection requests to overwhelm a server's resources?

Ping of death attack

Man-in-the-middle attack

Phishing attack

SYN flood attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves modifying the source address in IP packets to hide the identity of the sender?

ARP spoofing

DNS spoofing

IP spoofing

MAC spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves exploiting vulnerabilities in the TCP/IP protocol stack to gain unauthorized access to a system?

DNS poisoning

Cross-site scripting

SQL injection

TCP/IP hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending fake ARP messages to associate the attacker's MAC address with the IP address of another host?

IP spoofing

ARP spoofing

MAC flooding

DNS poisoning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?