2.5 SSH

2.5 SSH

Professional Development

13 Qs

quiz-placeholder

Similar activities

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

CCNP Screening Test

CCNP Screening Test

Professional Development

15 Qs

Network Fundamentals - Day 1

Network Fundamentals - Day 1

Professional Development

10 Qs

CCNA - Cap 2 (Camada 2)

CCNA - Cap 2 (Camada 2)

Professional Development

9 Qs

Pretest Sharing Session HLD and LLD FBB Core Area 4 Telkomsel

Pretest Sharing Session HLD and LLD FBB Core Area 4 Telkomsel

Professional Development

10 Qs

Posttest Sharing Session HLD and LLD FBB Core Area 4 Telkomsel

Posttest Sharing Session HLD and LLD FBB Core Area 4 Telkomsel

Professional Development

10 Qs

CYK1 Introduction to DSL

CYK1 Introduction to DSL

Professional Development

15 Qs

Zona desmilitarizada

Zona desmilitarizada

University - Professional Development

8 Qs

2.5 SSH

2.5 SSH

Assessment

Quiz

Computers

Professional Development

Medium

Created by

SHUSHANT TRIPATHI

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is the name of the stack that these layers represent

World Wide Web

TCP/IP

Communication Connectivity Stack

UDP

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the missing step in this Three Way Handshake?

Sync Request

Second Request

Acknowledge Request

Sync Acknowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sync Request Flooding is a type of Denial of Service attack

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why do UDP packets arrive out of order?

packets take different time to be verified by certificate authorities

packets can take different routes which alter communication time

packets are sent largest first to ensure data delivery

packet order is swapped as part of encryption

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

There is no mitigation against a UDP Flood Attack?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a vulnerability of Internet Protocol Version 4

Weak Encryption Options

IP Spoofing

IP Fragmentation Attacks

Limited Address Space

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the unique local network address given to connected network cards?

Media Access Control Address

Neighbour Device Address

Data Link Address

Local Device Address

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?