Network Security - Forms of Attack - CraignDave

Network Security - Forms of Attack - CraignDave

10th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

10th Grade

15 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity

Cybersecurity

9th - 11th Grade

14 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Network Security - Forms of Attack - CraignDave

Network Security - Forms of Attack - CraignDave

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Ms Baboolall

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes malicious software designed to infect computers and commit crimes such as fraud or identity theft?

Adware

Malware

Firmware

Shareware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is best described as:

Tricking people into revealing personal information by posing as a trusted entity

Using trial-and-error methods to guess a password

Flooding a server with traffic to make it crash

Inserting malicious code into a database application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method relies on repeatedly attempting different password combinations until the correct one is discovered?

SQL injection

Worm infiltration

Brute-force attack

Trojan payload

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flooding a server with a large volume of useless traffic, rendering it inaccessible to legitimate users, is known as:

Denial-of-service (DoS) attack

Man-in-the-middle attack

Ransomware exploit

Eavesdropping

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of network security, which statement best describes a Distributed Denial-of-Service (DDoS) attack?

A single compromised computer that scans for open ports

A system that repeatedly submits random login credentials

Multiple infected machines targeting one system simultaneously

An attack that exploits a website’s login form

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of data interception and theft?

Overloading network bandwidth to cause a server crash

Preventing users from accessing email accounts

Monitoring data streams to gather sensitive information

Damaging computer hardware through power surges

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to the act of monitoring network traffic (often in plain text) to capture sensitive data?

Spoofing

Tunneling

Sniffing (eavesdropping)

SQL injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?