1) What is the main goal of a Denial of Service (DoS) attack? a) To steal passwords b) To make a system or service unavailable c) To encrypt files for ransom 2) Which attack uses many systems to overwhelm a target? a) Rootkit attack b) Distributed Denial of Service (DDoS) attack c) Brute-force attack 3) What is a common indicator of a backdoor attack? a) Unexpected user accounts with high privileges b) Slow internet speed c) Encrypted emails 4) Spoofing involves: a) Sending large amounts of traffic to a server b) Infecting files with viruses c) Faking a digital identity to deceive systems 5) Mathematical attacks mainly target: a) Operating systems b) Network routers c) Cryptographic algorithms 6) Brute force attacks are used to: a) Guess passwords by trying many combinations b) Spread malware automatically c) Modify system files invisibly 7) Worms differ from viruses because they: a) Spread automatically without user action b) Require host files to spread c) Are always harmless 8) Which of the following is NOT malware? a) Spyware b) Firewall c) Trojan 9) What does S/MIME do? a) Encrypts and digitally signs emails b) Filters spam messages c) Detects hoax emails 10) Spam filters are used to: a) Encrypt emails b) Block unwanted bulk messages c) Track email attachments 11) An “open mail relay” can be exploited to: a) Send spam through your server b) Protect emails from phishing c) Store email backups 12) What is the function of a site survey in wireless networking? a) Detect rogue access points and vulnerabilities b) Encrypt wireless traffic c) Improve network speed 13) What does MAC filtering do? a) Encrypts wireless data b) Allows only approved devices to connect c) Changes IP addresses automatically 14) What improvement did WPA introduce over WEP? a) TKIP for dynamic key changes b) Static encryption keys c) Better network range 15) Which wireless security standard uses AES encryption? a) WEP b) WPA2 c) WPA 16) Which device manages network traffic and provides firewall functions? a) Router b) Switch c) Access Point 17) Which transmission medium is most resistant to electromagnetic interference (EMI)? a) Copper cable b) Fibre optic cable c) Wireless signal 18) What is the main purpose of shielding in transmission media? a) To increase cable length b) To encrypt data c) To reduce interference and data leakage 19) Which access control method verifies identity using physical traits? a) Passwords b) Digital signatures c) Biometrics 20) In a hospital access control plan, what should doctors have compared to reception staff? a) Same access as all staff b) No access c) Full read/write access
0%
Network Attacks & Security Practices
공유
공유
공유
만든이
Alvaroresearch
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?