Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?
Domain 4 Network Security

Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Quizizz Content
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
On-path attack
Deauthentication
DoS
Spoofing
Answer explanation
An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security concept dictates that a user be given only the permission to perform their job?
Zero trust
Role-based access
Least privilege
Defense in depth
Answer explanation
The principle of least privilege dictates that a user be given the least permission to perform their job.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle describes the process of verification of a user's identity?
Authentication
Authorization
Accounting
Auditing
Answer explanation
Authentication is the process of verification of a user's identify.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack can be used on a native VLAN?
Double-tagging
VLAN traversal
Truck popping
Denial of Service
Answer explanation
Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which console-based management protocol has built-in security?
SSH
SCP
HTTPS
FTP
Answer explanation
Secure Shell (SSH) negotiates encryption when a connection is made.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?
RADIUS
TACACS+
Kerberos
LDAP
Answer explanation
Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?
Shoulder surfing
Phishing
Tailgating
Whaling
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
Kuiz Mengenai Penyelesaian Masalah Komputer

Quiz
•
12th Grade
15 questions
Lesson 1: Online Services

Quiz
•
9th - 12th Grade
17 questions
A+ 2.1B Practice: Common Ports

Quiz
•
9th - 12th Grade
15 questions
Lesson 3: Impact of IT systems

Quiz
•
9th - 12th Grade
22 questions
Database Security Quiz

Quiz
•
12th Grade
25 questions
4. ADMINISTRASI INFRASTRUKTUR JARINGAN KELAS 12

Quiz
•
12th Grade
20 questions
ICS Domain 2 Review

Quiz
•
9th - 12th Grade
15 questions
Nmap Quiz

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade