
Cybersecurity Quiz: Brute Force and MiTM Attacks
Authored by Ritthea Man
English
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is a brute force attack?
An attack that systematically tries every possible password combination
An attack that involves physical access to a device
An attack that exploits software vulnerabilities
An attack that uses social engineering techniques
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
Which tool is commonly used for launching brute force attacks?
Metasploit
Nmap
Hydra
Wireshark
3.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What type of authentication protocol is particularly vulnerable to brute force attacks?
SFTP
HTTP Basic Authentication
SSH
HTTPS
4.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What command is used to launch a brute force attack with Hydra?
hydra -L
hydra -l
hydra -t
hydra -s
5.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is one effective way to defend against brute force attacks?
Allowing unlimited login attempts
Using weak passwords
Implementing rate limiting
Disabling two-factor authentication
6.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What does ARP stand for?
Automatic Response Protocol
Address Routing Protocol
Access Routing Protocol
Address Resolution Protocol
7.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
In a MiTM attack, what does the attacker do?
Encrypts the data
Intercepts communications between two devices
Increases network speed
Blocks all network traffic
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?