U1 B3 - Lesson 21-Data-Transmission-Security-Issues

U1 B3 - Lesson 21-Data-Transmission-Security-Issues

11th Grade

20 Qs

quiz-placeholder

Similar activities

Computer Quiz

Computer Quiz

6th - 12th Grade

20 Qs

WJEC ICT  - Chapter 2 - Network Protocols

WJEC ICT - Chapter 2 - Network Protocols

10th Grade - University

15 Qs

HS Computers- Networks

HS Computers- Networks

9th - 12th Grade

21 Qs

Layers, TCP/IP and Packet switching

Layers, TCP/IP and Packet switching

10th - 11th Grade

16 Qs

GCSE Wired and Wireless Networks

GCSE Wired and Wireless Networks

9th - 11th Grade

22 Qs

Unit 11 QUIZ Review

Unit 11 QUIZ Review

9th - 12th Grade

19 Qs

MonSec Final Quiz

MonSec Final Quiz

9th - 12th Grade

20 Qs

CS Python Fundamentals: The Internet

CS Python Fundamentals: The Internet

9th - 12th Grade

19 Qs

U1 B3 - Lesson 21-Data-Transmission-Security-Issues

U1 B3 - Lesson 21-Data-Transmission-Security-Issues

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Zahid Razzak

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must a user have to listen to network data?

A password

Access to the network

A special device

A software license

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a packet sniffer instruct your computer to do?

Ignore all network data

Inspect all data transmitted over a network

Delete all network data

Encrypt all network data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required for a device to access data using a packet sniffer?

A wireless connection

A direct connection to the network

A high-speed internet connection

A VPN service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is every computer connected to the internet identified?

By a number

By a username

By a password

By a color

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can spoofing allow an attacker to do?

Access private data

Improve internet speed

Increase storage capacity

Enhance graphics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack can spoofing be used to perform?

Denial of Service attack

Phishing attack

Malware attack

Ransomware attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can spoofing make an IP address appear?

Like a legitimate source of data

Like a virus

Like a game

Like a music file

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?