Domain 1 - Network Security

Domain 1 - Network Security

9th Grade

20 Qs

quiz-placeholder

Similar activities

Malware Quiz NVHS U1

Malware Quiz NVHS U1

11th Grade

20 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

12th Grade

25 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

Malware

Malware

11th Grade

15 Qs

Application/Service Attacks

Application/Service Attacks

KG - Professional Development

18 Qs

WNS Revision

WNS Revision

University

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

21 Qs

Domain 1 - Network Security

Domain 1 - Network Security

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Quizizz Content

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of MITB attacks?

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker runs SQL statements to infiltrate and change the data in a webpage

An attacker redirects data being sent from a browser to a device of their choosing

An attacker redirects data being sent from a browser to a device of their choosing

An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser

An attacker uses a script to obtain the cookies and certificates stored on a browser

An attacker changes the browser settings on a device

An attacker redirects data being sent from a browser to a device of their choosing

An attacker uses a script to obtain the cookies and certificates stored on a browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers manipulate information on servers by running SQL statements?

Man-in-the-middle attack

Brute force attack

       

   Cross-site scripting

SQL injection

      

Man-in-the-browser attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rootkit is used to gain which kind of access to a computer without being detected?

Executive

Global

Administrative

Guest

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.

Integer, number

Buffer, integer

Integer, integer

Buffer, number

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Zero day attack

Polymorphica

I’ma Hoax

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Trojan horse

Zero day attack

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which three (3) scenarios are examples of the correct usage of a logic bomb?

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

An attacker sets a logic bomb to detonate randomly across several machines

An attacker sets a logic bomb to detonate in a power grid  on the Western coast

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM

An attacker sets a logic bomb to detonate one month after they were fired from a company

An attacker sets a logic bomb to detonate on Christmas Eve

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?