Networks Under Attacks and Packet/Circuit Switching

Networks Under Attacks and Packet/Circuit Switching

Professional Development

10 Qs

quiz-placeholder

Similar activities

Big Data Analytics - Week 3 Data Streaming

Big Data Analytics - Week 3 Data Streaming

University - Professional Development

6 Qs

CCNA - Cap 3 (WANs and IP Routing)

CCNA - Cap 3 (WANs and IP Routing)

Professional Development

7 Qs

CN 15.06.2020

CN 15.06.2020

Professional Development

10 Qs

HFCL - 1

HFCL - 1

Professional Development

7 Qs

Packet Switching

Packet Switching

9th Grade - Professional Development

5 Qs

Network+ Practice

Network+ Practice

Professional Development

11 Qs

Understanding Switches in Networks

Understanding Switches in Networks

Professional Development

13 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Networks Under Attacks and Packet/Circuit Switching

Networks Under Attacks and Packet/Circuit Switching

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Dr CSE

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is a type of passive attack?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Packet Sniffing

SQL Injection

Answer explanation

Packet sniffing is a passive attack where an attacker intercepts and analyzes network traffic without altering it. In contrast, DoS, MitM, and SQL Injection are active attacks that disrupt or manipulate data.

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the main goal of a Denial of Service (DoS) attack?

Steal user credentials

Destroy data on a server

Make a system unavailable to users

Encrypt data for ransom

Answer explanation

The main goal of a Denial of Service (DoS) attack is to make a system unavailable to users by overwhelming it with traffic or requests, preventing legitimate access. This distinguishes it from other attacks like data theft or encryption.

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

In a Man-in-the-Middle attack, the attacker:

Overloads the server with traffic

Listens to communication without altering it

Intercepts and possibly alters communication between two parties

Spoofs the IP address of the user

Answer explanation

In a Man-in-the-Middle attack, the attacker intercepts and may alter communication between two parties, making this choice correct. The other options describe different types of attacks or actions.

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following attacks is commonly used to redirect users to a fake website?

ARP Poisoning

DNS Spoofing

Ransomware

SQL Injection

Answer explanation

DNS Spoofing is an attack that alters DNS records to redirect users to a fake website, making it the correct choice. ARP Poisoning targets local networks, Ransomware encrypts files, and SQL Injection exploits databases.

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which protocol is often used in spoofing attacks due to its stateless nature?

TCP

HTTPS

SSH

UDP

Answer explanation

UDP is often used in spoofing attacks because it is a stateless protocol, meaning it does not establish a connection before sending data. This allows attackers to easily forge packets without needing to maintain session information.

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the main disadvantage of circuit switching?

Inefficient use of resources

Delayed data transmission

Data loss in transit

Requires packet assembly at the receiver

Answer explanation

The main disadvantage of circuit switching is its inefficient use of resources, as it reserves a dedicated path for the entire duration of the communication, even if no data is being transmitted, leading to wasted bandwidth.

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is a key advantage of packet switching over circuit switching?

Fixed bandwidth allocation

Better for continuous voice transmission

Handles bursty data efficiently

No need for addressing in data packets

Answer explanation

Packet switching efficiently handles bursty data by allowing multiple data packets to share the same network resources, unlike circuit switching, which allocates fixed bandwidth for the entire duration of a connection.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?