Understanding TCP and UDP Attacks (SRWE 3.7)

Understanding TCP and UDP Attacks (SRWE 3.7)

12th Grade

21 Qs

quiz-placeholder

Similar activities

Quiz Monitoring Jaringan

Quiz Monitoring Jaringan

12th Grade

21 Qs

PTS Genap Informatika Kelas XI

PTS Genap Informatika Kelas XI

11th Grade - University

20 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Administrasi Jaringan XII Sesi 1

Administrasi Jaringan XII Sesi 1

12th Grade

25 Qs

Kuis Sistem Operasi jaringan

Kuis Sistem Operasi jaringan

12th Grade

18 Qs

ASAS GANJIL MATERI FIBER OPTIC

ASAS GANJIL MATERI FIBER OPTIC

12th Grade

20 Qs

latsol PH Informatika kelas 11 Jarkom

latsol PH Informatika kelas 11 Jarkom

11th Grade - University

20 Qs

Net+4.1 OB Questions

Net+4.1 OB Questions

12th Grade

26 Qs

Understanding TCP and UDP Attacks (SRWE 3.7)

Understanding TCP and UDP Attacks (SRWE 3.7)

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Sandy Thomaschek

Used 11+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does TCP stand for in computer networking?

Transmission Control Protocol

Transfer Communication Protocol

Transport Connection Protocol

Transmission Connection Protocol

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a characteristic of TCP? (choose 2)

Connectionless communication

Reliable delivery

Connection-oriented communication

No error checking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the TCP three-way handshake?

To encrypt data

To establish a connection

To terminate a connection

To reset a connection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a TCP SYN Flood attack, what is the attacker trying to exploit?

The encryption process

The three-way handshake

The data transfer phase

The connection termination process

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In a TCP SYN Flood attack . . .

the target device replies with a SYN-ACK

the target device's reply never reaches the destination because it is a spoofed address

the source device replies with a SYN-ACK

the target device's reply is sent to the threat actor's device eventhough it is a spoofed address

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a TCP Reset attack aim to do?

Establish a new connection

Terminate an existing connection

Encrypt data

Flood the network with packets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which packet is used in a TCP Reset attack?

SYN packet

ACK packet

RST packet

FIN packet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?