Networks Under Attacks and Packet/Circuit Switching

Networks Under Attacks and Packet/Circuit Switching

Professional Development

10 Qs

quiz-placeholder

Similar activities

Python-quiz2

Python-quiz2

University - Professional Development

11 Qs

[BD] 02.1 - Modelo Relacional - Intuição, Notação, Domínios

[BD] 02.1 - Modelo Relacional - Intuição, Notação, Domínios

University - Professional Development

12 Qs

ER Model

ER Model

Professional Development

10 Qs

Software Security

Software Security

University - Professional Development

10 Qs

C Programming

C Programming

Professional Development

10 Qs

Advance MS Excel Tips and Tricks

Advance MS Excel Tips and Tricks

Professional Development

10 Qs

Interesting Bird Facts

Interesting Bird Facts

KG - Professional Development

11 Qs

Streams

Streams

Professional Development

10 Qs

Networks Under Attacks and Packet/Circuit Switching

Networks Under Attacks and Packet/Circuit Switching

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Dr CSE

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is a type of passive attack?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Packet Sniffing

SQL Injection

Answer explanation

Packet sniffing is a passive attack where an attacker intercepts and analyzes network traffic without altering it. In contrast, DoS, MitM, and SQL Injection are active attacks that disrupt or manipulate data.

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the main goal of a Denial of Service (DoS) attack?

Steal user credentials

Destroy data on a server

Make a system unavailable to users

Encrypt data for ransom

Answer explanation

The main goal of a Denial of Service (DoS) attack is to make a system unavailable to users by overwhelming it with traffic or requests, preventing legitimate access. This distinguishes it from other attacks like data theft or encryption.

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

In a Man-in-the-Middle attack, the attacker:

Overloads the server with traffic

Listens to communication without altering it

Intercepts and possibly alters communication between two parties

Spoofs the IP address of the user

Answer explanation

In a Man-in-the-Middle attack, the attacker intercepts and may alter communication between two parties, making this choice correct. The other options describe different types of attacks or actions.

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following attacks is commonly used to redirect users to a fake website?

ARP Poisoning

DNS Spoofing

Ransomware

SQL Injection

Answer explanation

DNS Spoofing is an attack that alters DNS records to redirect users to a fake website, making it the correct choice. ARP Poisoning targets local networks, Ransomware encrypts files, and SQL Injection exploits databases.

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which protocol is often used in spoofing attacks due to its stateless nature?

TCP

HTTPS

SSH

UDP

Answer explanation

UDP is often used in spoofing attacks because it is a stateless protocol, meaning it does not establish a connection before sending data. This allows attackers to easily forge packets without needing to maintain session information.

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the main disadvantage of circuit switching?

Inefficient use of resources

Delayed data transmission

Data loss in transit

Requires packet assembly at the receiver

Answer explanation

The main disadvantage of circuit switching is its inefficient use of resources, as it reserves a dedicated path for the entire duration of the communication, even if no data is being transmitted, leading to wasted bandwidth.

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is a key advantage of packet switching over circuit switching?

Fixed bandwidth allocation

Better for continuous voice transmission

Handles bursty data efficiently

No need for addressing in data packets

Answer explanation

Packet switching efficiently handles bursty data by allowing multiple data packets to share the same network resources, unlike circuit switching, which allocates fixed bandwidth for the entire duration of a connection.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?