NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

University

15 Qs

quiz-placeholder

Similar activities

OSI Model - Transport Layer

OSI Model - Transport Layer

9th Grade - Professional Development

10 Qs

Computer Fun Review 3

Computer Fun Review 3

University

12 Qs

Informática y Sociedad - Internet

Informática y Sociedad - Internet

University

10 Qs

SRI-01 - Arquitetura Internet

SRI-01 - Arquitetura Internet

University

16 Qs

Komunikasi Data Industri

Komunikasi Data Industri

University

10 Qs

Cisco 2, Module 8

Cisco 2, Module 8

University

13 Qs

GIAO THỨC (PROTOCOL)

GIAO THỨC (PROTOCOL)

University

14 Qs

TCP UDP

TCP UDP

University

20 Qs

NS UNIT-1 QUIZ

NS UNIT-1 QUIZ

Assessment

Quiz

Computers

University

Hard

Created by

HARSHALI PATIL

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a vulnerability commonly found in the Application Layer of the TCP/IP model?

TCP Sequence Number Prediction

SYN Flood

Session Hijacking

ICMP Redirect Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk associated with DNS Cache Poisoning?

Loss of data integrity

Redirecting users to malicious websites

Overloading network traffic

Unauthorized access to network devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves an attacker impersonating a user or service by modifying cookies?

Session Hijacking

Replay Attack

Cross-Site Scripting (XSS)

Cookie Poisoning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol vulnerability is exploited during a SYN Flood attack?

TCP

ICMP

UDP

DNS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What countermeasure can protect against session hijacking attacks?

Use of strong passwords

Use of HTTPS for encrypted communication

Regular password changes

Multi-factor authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of a Denial of Service (DoS) attack?

To gain unauthorized access to systems

To disrupt the availability of a service

To steal sensitive information

To modify data in transit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main vulnerability of the RIP protocol in the Internetwork Layer?

Lack of encryption

Inability to handle large networks

Lack of authentication for routing information

Poor error handling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?