Domain 1 - Network Security

Quiz
•
Computers
•
9th Grade
•
Medium
Wayground Content
Used 11+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which three (3) scenarios are examples of MITB attacks?
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker runs SQL statements to infiltrate and change the data in a webpage
An attacker redirects data being sent from a browser to a device of their choosing
An attacker redirects data being sent from a browser to a device of their choosing
An attacker records a user’s keystrokes and uses the captured password to hack into the user’s browser
An attacker uses a script to obtain the cookies and certificates stored on a browser
An attacker changes the browser settings on a device
An attacker redirects data being sent from a browser to a device of their choosing
An attacker uses a script to obtain the cookies and certificates stored on a browser
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers manipulate information on servers by running SQL statements?
Man-in-the-middle attack
Brute force attack
Cross-site scripting
SQL injection
Man-in-the-browser attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A rootkit is used to gain which kind of access to a computer without being detected?
Executive
Global
Administrative
Guest
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A buffer overflow attack occurs when one attempts to fill a(n) (BLANK) field with a number outside the (BLANK) range.
Integer, number
Buffer, integer
Integer, integer
Buffer, number
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following malware types causes security breaches that have not yet been identified by credible sources?
Zero day attack
Polymorphica
I’ma Hoax
Logic bomb
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?
Trojan horse
Zero day attack
Worm
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which three (3) scenarios are examples of the correct usage of a logic bomb?
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
An attacker sets a logic bomb to detonate randomly across several machines
An attacker sets a logic bomb to detonate in a power grid on the Western coast
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate on May 5, 2005 at 5 PM
An attacker sets a logic bomb to detonate one month after they were fired from a company
An attacker sets a logic bomb to detonate on Christmas Eve
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
ONE 6th FORM Karnaugh Maps

Quiz
•
11th Grade
18 questions
Algorithms Unit 2.1 Review

Quiz
•
8th - 10th Grade
16 questions
Y10 Computer Hardware: CPU

Quiz
•
9th Grade
18 questions
AQA GCSE 8525 Logic Gate Basics

Quiz
•
9th - 10th Grade
20 questions
Topic 2 - Computing Hardware

Quiz
•
1st - 9th Grade
16 questions
CS #3 Boolean Logic

Quiz
•
9th - 12th Grade
20 questions
3.2 Logic Gates and Logic Circuits Cambridge iAS 9618

Quiz
•
11th Grade
16 questions
Logic Gates, K Maps and Adders

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade