NSM-4

NSM-4

1st Grade

6 Qs

quiz-placeholder

Similar activities

AIJ - Kelas 12

AIJ - Kelas 12

1st Grade

6 Qs

TCP/UDP Vulnerabilities

TCP/UDP Vulnerabilities

1st Grade

10 Qs

Administración de Servicios de Red

Administración de Servicios de Red

1st Grade

8 Qs

TEMA 5: IMPLEMENTANDO TCP/IP EN LA LÍNEA DE COMANDOS

TEMA 5: IMPLEMENTANDO TCP/IP EN LA LÍNEA DE COMANDOS

1st - 3rd Grade

10 Qs

1.1 - Internal components of a computer

1.1 - Internal components of a computer

KG - University

10 Qs

Transmission Media

Transmission Media

1st Grade - University

10 Qs

EXAMEN

EXAMEN

1st Grade

10 Qs

The Internet: Addressing, Routing, and Reliability

The Internet: Addressing, Routing, and Reliability

KG - 12th Grade

10 Qs

NSM-4

NSM-4

Assessment

Quiz

Computers

1st Grade

Hard

Created by

Minh Nguyễn

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?


  • DNS poisoning

  • session hijacking

  • SYN flood

  • DDoS

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In which type of attack is falsified information used to redirect users to malicious Internet sites?

  • domain generation

  • ARP cache poisoning

  • DNS amplification and reflection

  • DNS cache poisoning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

  • data

  • security

  • employee

  • company

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.)

  • hardware used by applications

  • data analysis trends

  • number of systems on each network

  • network baseline data

  • important applications used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the MITRE Corporation create and maintain?

  • IOC

  • TAXII

  • CVE

  • STIX

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do several network organizations, professionals, and intelligence agencies use shared open standards for threat intelligence?

  • to ensure real-time synchronization of all antivirus signature databases

  • to enable exchange of all response mechanisms to new threats

  • to update all vulnerabilities databases across all malware vendors

  • to enable the exchange of CTI in an automated, consistent, and machine readable format