
Network Security - Forms of Attack - CraignDave
Authored by Ms Baboolall
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term best describes malicious software designed to infect computers and commit crimes such as fraud or identity theft?
Adware
Malware
Firmware
Shareware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is best described as:
Tricking people into revealing personal information by posing as a trusted entity
Using trial-and-error methods to guess a password
Flooding a server with traffic to make it crash
Inserting malicious code into a database application
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack method relies on repeatedly attempting different password combinations until the correct one is discovered?
SQL injection
Worm infiltration
Brute-force attack
Trojan payload
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Flooding a server with a large volume of useless traffic, rendering it inaccessible to legitimate users, is known as:
Denial-of-service (DoS) attack
Man-in-the-middle attack
Ransomware exploit
Eavesdropping
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of network security, which statement best describes a Distributed Denial-of-Service (DDoS) attack?
A single compromised computer that scans for open ports
A system that repeatedly submits random login credentials
Multiple infected machines targeting one system simultaneously
An attack that exploits a website’s login form
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of data interception and theft?
Overloading network bandwidth to cause a server crash
Preventing users from accessing email accounts
Monitoring data streams to gather sensitive information
Damaging computer hardware through power surges
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms refers to the act of monitoring network traffic (often in plain text) to capture sensitive data?
Spoofing
Tunneling
Sniffing (eavesdropping)
SQL injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
ICT Computer Basics pt1
Quiz
•
10th - 12th Grade
15 questions
J808 LO1 and LO2 planning project keywords / terms
Quiz
•
9th - 11th Grade
15 questions
UH 1 BTIK
Quiz
•
10th Grade
12 questions
JUEGO - UNIDADES DE MEDIDA DE ALMACENAMIENTO
Quiz
•
1st - 10th Grade
15 questions
Identidad Corporativa
Quiz
•
10th Grade
10 questions
Excel
Quiz
•
10th - 11th Grade
12 questions
limbajul pascal
Quiz
•
10th Grade
10 questions
Konsep Routing
Quiz
•
1st - 10th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade