Technologies and Protocols Quiz

Technologies and Protocols Quiz

University

38 Qs

quiz-placeholder

Similar activities

TCW Chapter 3 Part 1 Review Test

TCW Chapter 3 Part 1 Review Test

University

37 Qs

Final Exam 1st Semester

Final Exam 1st Semester

8th Grade - University

40 Qs

INSTI R1 - QUIZ M1-M3

INSTI R1 - QUIZ M1-M3

University

40 Qs

Semi-Final Exam

Semi-Final Exam

University

40 Qs

Health and Safety revision

Health and Safety revision

University

34 Qs

LearnTube Ethical Hacking Quiz 30/3/23

LearnTube Ethical Hacking Quiz 30/3/23

University

35 Qs

Dion Practice Test Most Missed Questions

Dion Practice Test Most Missed Questions

University

40 Qs

Mississippi Driver's License Quiz 1

Mississippi Driver's License Quiz 1

9th Grade - University

33 Qs

Technologies and Protocols Quiz

Technologies and Protocols Quiz

Assessment

Quiz

Other

University

Easy

Created by

NoBS NoBS

Used 1+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do cybercriminals make use of a malicious iFrame?

The iFrame allows the browser to load a web page from another source.

The attacker embeds malicious content in business appropriate files.

The attacker redirects traffic to an incorrect DNS server.

The iFrame allows multiple DNS subdomains to be used.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?

HTTPS traffic is much faster than HTTP traffic.

HTTPS traffic enables end-to-end encryption.

HTTPS traffic does not require authentication.

HTTPS traffic can carry a much larger data payload than HTTP can carry.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

SNMP

NetFlow

syslog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

SSH

NTP

syslog

AAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

69

123

443

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of server can threat actors use DNS to communicate with?

CnC

database

NTP

web

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?