Resiliency and Site Security

Resiliency and Site Security

9th Grade

25 Qs

quiz-placeholder

Similar activities

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

Ulangan Harian - Jaringan Komputer & Analisis Data

Ulangan Harian - Jaringan Komputer & Analisis Data

10th Grade

20 Qs

ĐC CNTT_Chương 1

ĐC CNTT_Chương 1

University

20 Qs

PTS PWPB Kelas 11 Sem 1

PTS PWPB Kelas 11 Sem 1

11th Grade

21 Qs

SUMATIF MS WORD X E 4 DAN 5

SUMATIF MS WORD X E 4 DAN 5

10th Grade

20 Qs

Mid Test Perancangan&Konstruksi PL

Mid Test Perancangan&Konstruksi PL

University

20 Qs

Resiliency and Site Security

Resiliency and Site Security

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Carlos Sowell

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Keypad locks

Smart card

Proximity card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Password sniffing

Brute force attack

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which passive reconnaissance tool is used to gather information from a variety of public sources?

theHarvester

scanless

Shodan

Packet sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?

Nessus

Wireshark

nmap

OVAL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?

DNS-based on-path attack

DNS attack indicators

DNS poisoning

DNS client cache poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?

Port mirroring

MAC spoofing

ARP poisoning

MAC flooding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Network-based firewall

Host-based firewall

Signature-based IDS

Antivirus scanner

Anomaly-based IDS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?