Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

quiz-placeholder

Similar activities

NSTP QUIZ FOR MIDTERM

NSTP QUIZ FOR MIDTERM

University

30 Qs

Software Terms

Software Terms

6th Grade - University

25 Qs

Internet Research Prelim Exam

Internet Research Prelim Exam

University

27 Qs

NCM 121 quiz 1

NCM 121 quiz 1

University

30 Qs

ICTE 10083

ICTE 10083

University

25 Qs

(Part 1/3) Modules 3 – 5: Network Security

(Part 1/3) Modules 3 – 5: Network Security

University

25 Qs

Plant Safety Network

Plant Safety Network

University

30 Qs

Security

Security

12th Grade - Professional Development

24 Qs

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

Assessment

Quiz

Other

University

Medium

Created by

awit yawa

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

spyware

  • phishing

DDoS

  • social engineering

  • adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What causes a buffer overflow?

  • downloading and installing too many software updates at one time

attempting to write more data to a memory location than that location can hold

  • sending too much information to two or more interfaces of the same device, thereby causing dropped packets

  • sending repeated connections such as Telnet to a particular device, thus denying other data sources

  • launching a security countermeasure to mitigate a Trojan horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which objective of secure communications is achieved by encrypting data?

  • authentication

confidentiality

  • integrity

  • availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of malware has the primary objective of spreading across the network?

  • virus

  • botnet

  • Trojan horse

  • worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which algorithm can ensure data confidentiality?

  • MD5

  • PKI

  • AES

  • RSA

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6. What three items are components of the CIA triad? (Choose three.)

scalibility

access

confidentiality

integrity

availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?

  • address spoofing

  • ICMP redirect

  • DDoS

  • MITM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?