Resiliency and Site Security

Quiz
•
Computers
•
9th Grade
•
Medium
Carlos Sowell
Used 8+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Keypad locks
Smart card
Proximity card
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Password sniffing
Brute force attack
Keylogger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which passive reconnaissance tool is used to gather information from a variety of public sources?
theHarvester
scanless
Shodan
Packet sniffing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
Nessus
Wireshark
nmap
OVAL
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?
DNS-based on-path attack
DNS attack indicators
DNS poisoning
DNS client cache poisoning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?
Port mirroring
MAC spoofing
ARP poisoning
MAC flooding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Network-based firewall
Host-based firewall
Signature-based IDS
Antivirus scanner
Anomaly-based IDS
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Computer Networks Review

Quiz
•
9th - 12th Grade
21 questions
client server

Quiz
•
10th - 11th Grade
21 questions
Domain 1 - Networking

Quiz
•
10th Grade
24 questions
iGCSE Computer Science: Networks

Quiz
•
9th - 12th Grade
20 questions
ICT - CSS - SCS - Configure Network Sevices

Quiz
•
10th Grade
21 questions
Pentadbiran Server

Quiz
•
1st - 12th Grade
20 questions
WSALSA_TEST_1

Quiz
•
University
20 questions
ITGS CHAPTER 1 TO CHAPTER 5

Quiz
•
11th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade