A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP. Which type of attack does this scenario describe?

Cybersecurity Practice

Quiz
•
Information Technology (IT)
•
11th Grade
•
Easy
CISCO CERTIFICATIONS
Used 23+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ransomware
DDos
Man-in-the Middle
Reconnaissance
Answer explanation
This scenario describes a Man-in-the-Middle attack, where the rogue access point intercepts and relays traffic between the user and the legitimate access point, allowing the attacker to capture sensitive information.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You notice that a new CVE has been shared to an email group that you belong to. What should you do first with the CVE?
Record the CVE as part of the disaster recovery plan
Look up the details of the vulnerability to determine whether it applies to your network
Add the CVE to the firewall rules for your organization
Research measures to prevent the CVE from attacking the network
Answer explanation
The first step is to look up the details of the CVE to assess its relevance to your network. Understanding the vulnerability helps determine the appropriate response and mitigation measures.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which password follows strong password policy guidelines?
Snuffy#
1mpressive1
Mar221984
Wh@tareyouDo1ngtoday4
Answer explanation
The password 'Wh@tareyouDo1ngtoday4' is strong because it includes a mix of uppercase and lowercase letters, numbers, and special characters, making it complex. The other options lack sufficient complexity or length.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your supervisor tells you that you will participate in a CVSS assessment. What will you be doing?
Interviewing users to determine their level of cybersecurity awareness
Analyzing host logs to identify abnormal activities
Evaluating end system security and scoring vulverabilities
Performing penetration tests on internal network devices and systems
Answer explanation
In a CVSS assessment, you will evaluate end system security and score vulnerabilities to determine their severity and impact, which is essential for prioritizing remediation efforts.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How do threat actors launch ransomware attacks on organizations?
They implant malware to collect data from the corporation's financial system
They deface an organization's public facing website
They secretly spy on employees and collect their personal information
They lock data and deny access until they receive money
Answer explanation
Ransomware attacks involve locking data and denying access until a ransom is paid. This method directly targets an organization's ability to operate, making it a primary tactic for threat actors.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The company web server collect information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised..
What is the cause of the security breach?
The data was transferred to the database using a nonsecure protocol
The database was compromised
The content was accessed using HTTP, which is an unencrypted protocol
The web browser used to access the site wasnot updated to the latest version
Answer explanation
The correct choice is that the content was accessed using HTTP, which is an unencrypted protocol. This means that data transmitted over port 80 is vulnerable to interception, leading to potential compromise.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?
VMware
Microsoft Management Console
MS-DOS
Powershell
Answer explanation
Powershell is a command-line interface specifically designed for Windows, featuring a powerful scripting language that allows users to automate various tasks efficiently, making it the correct choice.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Quiz Keamanan Data dan Informasi

Quiz
•
9th Grade - University
28 questions
STS GENAP INFORMATIKA 9

Quiz
•
9th Grade - University
20 questions
Topologi dan Model Jaringan

Quiz
•
11th Grade
23 questions
Web Technologies Quiz

Quiz
•
11th Grade
25 questions
Social Engineering & Access Control Quiz

Quiz
•
11th Grade
24 questions
Net+ CertMaster Section 1.1 Test

Quiz
•
11th Grade
25 questions
UH_TIK (XI)

Quiz
•
11th Grade - University
27 questions
PRACTICE TEST FOR 4TH QUARTER - TLE ICT 10

Quiz
•
10th Grade - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Information Technology (IT)
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
10 questions
Right Triangles: Pythagorean Theorem and Trig

Quiz
•
11th Grade
65 questions
MegaQuiz v2 2025

Quiz
•
9th - 12th Grade
10 questions
GPA Lesson

Lesson
•
9th - 12th Grade
15 questions
SMART Goals

Quiz
•
8th - 12th Grade