Domain 1 - Network Security

Domain 1 - Network Security

9th Grade

20 Qs

quiz-placeholder

Similar activities

GCSE Computing: Computational Logic 2.4

GCSE Computing: Computational Logic 2.4

11th - 12th Grade

15 Qs

CSC098 - Kuiz Chapter 12

CSC098 - Kuiz Chapter 12

University

23 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

OCR J277 1.1 Systems Architecture

OCR J277 1.1 Systems Architecture

10th - 11th Grade

20 Qs

[AP CSP] Malware & Phishing Scams

[AP CSP] Malware & Phishing Scams

9th - 12th Grade

21 Qs

JavaScript Chapter 11 uCertify Test

JavaScript Chapter 11 uCertify Test

9th - 12th Grade

15 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

20 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

Domain 1 - Network Security

Domain 1 - Network Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Wayground Content

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of MITB attacks?

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker runs SQL statements to infiltrate and change the data in a webpage

An attacker redirects data being sent from a browser to a device of their choosing

An attacker redirects data being sent from a browser to a device of their choosing

An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers manipulate information on servers by running SQL statements?

Man-in-the-middle attack

Brute force attack

       

   Cross-site scripting

SQL injection

      

Man-in-the-browser attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rootkit is used to gain which kind of access to a computer without being detected?

Executive

Global

Administrative

Guest

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.

Integer, number

Buffer, integer

Integer, integer

Buffer, number

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Zero day attack

Polymorphica

I’ma Hoax

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Trojan horse

Zero day attack

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of the correct usage of a logic bomb?

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?