placeholder image to represent content

Network attacks

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
11 questions
Show answers
  • Q1
    What is the primary countermeasure to social engineering?
    heavy management oversight
    traffic filters
    awareness
    a written security policy
    30s
  • Q2
    Which of the following is an example of social engineering?
    port scanning
    war dialing
    dumpster diving
    ransomware
    30s
  • Q3
    Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?
    man-in-the-middle
    piggybacking
    phishing
    smurf
    30s
  • Q4
    A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of attack best describes this scenario?
    MAC spoofing
    passive
    Whaling
    masquerading
    300s
  • Q5
    On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?
    Tell him no and quickly close the door.
    let him in and help him find the restroom. Then let him work.
    Let him in.
    direct him to the front entrance and instruct him to check in with the receptionist
    300s
  • Q6
    Which of the following statements about the use of anti-virus software is correct?
    if you install anti-virus software, you no longer need a firewall on your network
    antivirus software should be configured to download updated virus definition files as soon as they become available
    Once installed, anti-virus software needs to be updated on a monthly basis
    if servers on a network have anti-virus software installed, workstations do not need anti-virus software installed on them
    300s
  • Q7
    An attacked sets up 100 drone computers that flood a DNS server with invalid requests. This an example of which kind of attack?
    DoS
    Spamming
    Replay
    DDoS
    300s
  • Q8
    An attacker captures packets as they travel from one host to another with the intent of altering the contents of the packets. Which type of attack is being executed?
    passive logging
    DDoS
    man-in-the-middle
    spamming
    300s
  • Q9
    Which option is a program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously?
    worm
    outlook express
    trojan horse
    macro
    300s
  • Q10
    Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
    snooping
    sniffing
    spamming
    spoofing
    300s
  • Q11
    While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attack has likely occurred?
    Man-in-the-middle
    Spoofing
    DNS poisoning
    Hijacking
    300s

Teachers give this quiz to your class