
POST-TEST DAY 3

Quiz
•
Information Technology (IT)
•
Professional Development
•
Hard
Nurcholis Majid
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John is a pen tester working with an information security consultant based in Paris. As part of a penetration testing assignment, he was asked to perform wireless penetration testing for a large MNC. John knows that the company provides free Wi-Fi access to its employees on the company premises. He sets up a rogue wireless access point with the same SSID as that of the company’s Wi-Fi network just outside the company premises. He sets up this rogue access point using the tools that he has and hopes that the employees might connect to it. What type of wireless confidentiality attack is John trying to do?
KRACK Attack
WEP Cracking
Evil Twin AP
War Driving
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following Encryption technique is used in WPA?
DES
AES
TKIP
RSA
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a mobile platform risk?
Malicious Apps in App Store
Sandboxing
Jailbreaking and Rooting
Mobile Malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, an attacker, attempted to gain illegitimate access to a user’s bank account. To achieve his goal, James tricked mobile phone sellers into providing PII of the target user and exploited the instant message service on the user’s device, which helped him reset the password and access the victim’s account.
Identify the type of attack performed by James in the above scenario.
Brute-force attack
Cross-site request forgery
OTP hijacking
DNS poisoning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?
Mobile
Network
Application
Cloud
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following Nmap commands is used by an attacker to identify the IPv6 capabilities of a target IoT device?
nmap -n -Pn -sS -pT:0-65535 -v -A -oX <Name> <IP>
nmap -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>
nmap -p 80,81,8080,8081 <Target IP address range>
nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX <Name> <IP>
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following levels of the Purdue model can the analysis and alteration of the physical process be performed?
Level 2
Level 3
Level 1
Level 0
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Dimensionnement SI SIG

Quiz
•
Professional Development
15 questions
MIC Customs Solutions Quiz

Quiz
•
Professional Development
8 questions
Nutanix Quiz - MII Sinergi

Quiz
•
Professional Development
10 questions
AWS Domínio 1

Quiz
•
Professional Development
5 questions
Knowledge Check 3

Quiz
•
Professional Development
15 questions
Activity 2 IT era

Quiz
•
Professional Development
10 questions
Arcserve Quiz Time

Quiz
•
Professional Development
6 questions
AWS UG Finops

Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade