Resiliency and Site Security

Resiliency and Site Security

9th Grade

25 Qs

quiz-placeholder

Similar activities

1.4 - Network security

1.4 - Network security

7th - 10th Grade

25 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

OCR J277 1. 4 - Network Security and Threats Quiz

OCR J277 1. 4 - Network Security and Threats Quiz

10th Grade

20 Qs

Topic 7 CFD1313

Topic 7 CFD1313

University

20 Qs

Communication and networks

Communication and networks

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Network Security J277

Network Security J277

9th Grade

24 Qs

Unit 11: Cybersecurity

Unit 11: Cybersecurity

10th - 12th Grade

22 Qs

Resiliency and Site Security

Resiliency and Site Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Carlos Sowell

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Keypad locks

Smart card

Proximity card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Password sniffing

Brute force attack

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which passive reconnaissance tool is used to gather information from a variety of public sources?

theHarvester

scanless

Shodan

Packet sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?

Nessus

Wireshark

nmap

OVAL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?

DNS-based on-path attack

DNS attack indicators

DNS poisoning

DNS client cache poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?

Port mirroring

MAC spoofing

ARP poisoning

MAC flooding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Network-based firewall

Host-based firewall

Signature-based IDS

Antivirus scanner

Anomaly-based IDS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?