Network attacks
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
11 questions
Show answers
- Q1What is the primary countermeasure to social engineering?heavy management oversighttraffic filtersawarenessa written security policy30s
- Q2Which of the following is an example of social engineering?port scanningwar dialingdumpster divingransomware30s
- Q3Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?man-in-the-middlepiggybackingphishingsmurf30s
- Q4A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of attack best describes this scenario?MAC spoofingpassiveWhalingmasquerading300s
- Q5On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?Tell him no and quickly close the door.let him in and help him find the restroom. Then let him work.Let him in.direct him to the front entrance and instruct him to check in with the receptionist300s
- Q6Which of the following statements about the use of anti-virus software is correct?if you install anti-virus software, you no longer need a firewall on your networkantivirus software should be configured to download updated virus definition files as soon as they become availableOnce installed, anti-virus software needs to be updated on a monthly basisif servers on a network have anti-virus software installed, workstations do not need anti-virus software installed on them300s
- Q7An attacked sets up 100 drone computers that flood a DNS server with invalid requests. This an example of which kind of attack?DoSSpammingReplayDDoS300s
- Q8An attacker captures packets as they travel from one host to another with the intent of altering the contents of the packets. Which type of attack is being executed?passive loggingDDoSman-in-the-middlespamming300s
- Q9Which option is a program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously?wormoutlook expresstrojan horsemacro300s
- Q10Which type of activity changes or falsifies information in order to mislead or re-direct traffic?snoopingsniffingspammingspoofing300s
- Q11While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attack has likely occurred?Man-in-the-middleSpoofingDNS poisoningHijacking300s