Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

quiz-placeholder

Similar activities

sonic exe your worst nightmare hahaha

sonic exe your worst nightmare hahaha

1st Grade - University

25 Qs

FIL.12

FIL.12

University

30 Qs

REVISÃO DIREÇÃO DE ARTE

REVISÃO DIREÇÃO DE ARTE

University

24 Qs

LA PERSONA HUMANA

LA PERSONA HUMANA

University

24 Qs

Responsible Tourism

Responsible Tourism

University

25 Qs

kuis LKMMI-TD

kuis LKMMI-TD

University

25 Qs

Exam 2- Review

Exam 2- Review

University

25 Qs

UTS Gizi & Diet

UTS Gizi & Diet

University

25 Qs

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

awit yawa

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

spyware

  • phishing

DDoS

  • social engineering

  • adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What causes a buffer overflow?

  • downloading and installing too many software updates at one time

attempting to write more data to a memory location than that location can hold

  • sending too much information to two or more interfaces of the same device, thereby causing dropped packets

  • sending repeated connections such as Telnet to a particular device, thus denying other data sources

  • launching a security countermeasure to mitigate a Trojan horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which objective of secure communications is achieved by encrypting data?

  • authentication

confidentiality

  • integrity

  • availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of malware has the primary objective of spreading across the network?

  • virus

  • botnet

  • Trojan horse

  • worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which algorithm can ensure data confidentiality?

  • MD5

  • PKI

  • AES

  • RSA

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6. What three items are components of the CIA triad? (Choose three.)

scalibility

access

confidentiality

integrity

availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?

  • address spoofing

  • ICMP redirect

  • DDoS

  • MITM

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?