3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

University

15 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

Examen de Seguridad TI

Examen de Seguridad TI

University

15 Qs

Quiz on "Security in Operating System and Networks"

Quiz on "Security in Operating System and Networks"

University

20 Qs

Intruders Attacks on Network and Computers

Intruders Attacks on Network and Computers

University

15 Qs

IS Quiz-1

IS Quiz-1

University

20 Qs

NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

University

15 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

3A-DDC313-SW5

3A-DDC313-SW5

Assessment

Quiz

Computers

University

Medium

Created by

Juvy Cruz

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker intercepts and alters communications between a client and server over an unsecure network.

What type of attack is this?

Man-in-the-Middle (MITM)

DDoS

Phishing

SQL Injection

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.

What type of attack is this?

Distributed Denial of Service (DDoS)

Spoofing

SQL Injection

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.

What attack is this?

ARP Spoofing

DNS Spoofing

Man-in-the-Middle Attack

Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.

What type of attack is this?

Brute Force Attack

Phishing

Cross-Site Scripting (XSS)

Keylogging

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.

What is this attack called?

DNS Spoofing

ARP Poisoning

MITM Attack

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.

What type of attack is this?

DDoS SYN Flood

SQL Injection

Cross-Site Scripting (XSS)

Ransomware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scenario:

A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.

What type of attack is this?

Brute Force Attack

Zero-Day Attack

Ransomware

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?