IP Vulnerabilities and Threats Quiz

Quiz
•
Education
•
University
•
Medium
AHMAD ABIDIN
Used 2+ times
FREE Resource
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Jackson is curious about network attacks. He asks, what type of attack uses ICMP echo packets to discover hosts on a network?
ICMP Attacks
ARP Spoofing
DNS Tunneling
SYN Flood Attack
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Mia is studying network security and comes across a type of attack that involves spoofing the source IP address in a packet. What is this attack called?
TCP Reset Attack
Session Hijacking
UDP Flood Attack
Address Spoofing
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a class project, Benjamin discovered that someone was intercepting messages between him and Mia. What is the primary purpose of a man-in-the-middle (MITM) attack?
To perform DoS attacks
To monitor and alter communication
To discover network topology
To hijack sessions
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a group project, Emma and Aiden are discussing the characteristics of TCP. Which of the following is a characteristic of TCP?
Connectionless protocol
Reliable delivery
No flow control
Lower overhead than UDP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ethan is trying to understand different types of cyber attacks. He learns about an attack that sends multiple SYN requests to a web server. What is this type of attack called?
ICMP Redirect Attack
ARP Cache Poisoning
TCP SYN Flood Attack
UDP Flood Attack
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Sophia asked her classmates about common techniques used in DNS attacks. Which of the following did they discuss?
Session Hijacking
SYN Flooding
MAC Address Spoofing
Fast Flux
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a class project, Zoe discovered that ARP cache poisoning could be used to manipulate network traffic. What does ARP cache poisoning aim to achieve?
Redirect traffic to a malicious server
Alter TCP segments
Perform a DoS attack
Discover network hosts
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
Revision NDC: Topic 5

Quiz
•
University
30 questions
Chapter 3 P2P and datalink layer

Quiz
•
University
30 questions
Topic 4: NDC

Quiz
•
University
30 questions
TM 1 - MANAJEMEN PROYEK IT

Quiz
•
University
26 questions
Recursive Functions and Data Structures

Quiz
•
University
25 questions
Easy BreezeIII

Quiz
•
University
24 questions
BCS Systems & Architecture Quiz 2

Quiz
•
University - Professi...
25 questions
ULANGKAJI COCU 3

Quiz
•
1st Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Education
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University