
3A-DDC313-SW5
Authored by Juvy Cruz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker intercepts and alters communications between a client and server over an unsecure network.
What type of attack is this?
Man-in-the-Middle (MITM)
DDoS
Phishing
SQL Injection
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker floods a network with excessive traffic from multiple sources to overwhelm and incapacitate network resources.
What type of attack is this?
Distributed Denial of Service (DDoS)
Spoofing
SQL Injection
Buffer Overflow
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits a weakness in a network protocol to gain unauthorized access to sensitive data being transferred between two devices.
What attack is this?
ARP Spoofing
DNS Spoofing
Man-in-the-Middle Attack
Phishing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A network is compromised by an attacker using a tool to send a massive number of authentication requests in a short time, attempting to guess login credentials.
What type of attack is this?
Brute Force Attack
Phishing
Cross-Site Scripting (XSS)
Keylogging
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker sends fake Address Resolution Protocol (ARP) messages to redirect traffic on a local network.
What is this attack called?
DNS Spoofing
ARP Poisoning
MITM Attack
Phishing
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
An attacker tries to exhaust the available connections to a server by sending numerous incomplete connection requests.
What type of attack is this?
DDoS SYN Flood
SQL Injection
Cross-Site Scripting (XSS)
Ransomware
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scenario:
A hacker exploits an unpatched vulnerability in a router, gaining administrative access to the device and manipulating its configurations, before the administrator can fix it.
What type of attack is this?
Brute Force Attack
Zero-Day Attack
Ransomware
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?