(Part 1/3) Modules 3 – 5: Network Security

(Part 1/3) Modules 3 – 5: Network Security

University

25 Qs

quiz-placeholder

Similar activities

INGENIERO TECNOLOGIAS DE ACCESO PON

INGENIERO TECNOLOGIAS DE ACCESO PON

University - Professional Development

23 Qs

aij kls 2

aij kls 2

University

20 Qs

Networking Quiz 1

Networking Quiz 1

University - Professional Development

23 Qs

Quiz AIJ

Quiz AIJ

University

20 Qs

(Part 2/3) Modules 1 – 2: OSPF Concepts and Configuration

(Part 2/3) Modules 1 – 2: OSPF Concepts and Configuration

University

22 Qs

Pemahaman Dasar Jaringan Komputer

Pemahaman Dasar Jaringan Komputer

University

20 Qs

Thera 2 Short Quiz 2 - Knee Complex

Thera 2 Short Quiz 2 - Knee Complex

University

20 Qs

Mr. Cassani's CompTIA A+ (Core 1) Exam

Mr. Cassani's CompTIA A+ (Core 1) Exam

9th Grade - Professional Development

21 Qs

(Part 1/3) Modules 3 – 5: Network Security

(Part 1/3) Modules 3 – 5: Network Security

Assessment

Quiz

Other

University

Hard

Created by

awit yawa

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

  • adware

  • DDoS

  • phishing

  • social engineering

  • spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What causes a buffer overflow?

  • launching a security countermeasure to mitigate a Trojan horse

  • downloading and installing too many software updates at one time

attempting to write more data to a memory location than that location can hold

  • sending too much information to two or more interfaces of the same device, thereby causing dropped packets

  • sending repeated connections such as Telnet to a particular device, thus denying other data sources

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which objective of secure communications is achieved by encrypting data?

  • authentication

  • availability

confidentiality

  • integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of malware has the primary objective of spreading across the network?

  • worm

  • virus

  • Trojan horse

  • botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

financial gain

  • fame seeking

  • status among peers

  • political reasons

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. Which type of hacker is motivated to protest against political and social issues?

hacktivist

  • cybercriminal

  • script kiddie

  • vulnerability broker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. What is a ping sweep?

  • a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.

  • a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.

  • a software application that enables the capture of all network packets that are sent across a LAN.

a network scanning technique that indicates the live hosts in a range of IP addresses.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?