100% Free Exams (No login or credit card required)

Section 4.2

Demonstrate your acquired knowledge about summarizing various types of attacks and their impact to the network.. This will demonstrate your proficiency for section 4.2 of the Network+ 10-009 objectives.

1 / 25

What’s the best immediate response if an evil twin AP is suspected in a corporate wireless environment?

2 / 25

Which tool is useful in identifying rogue DHCP servers on a network?

3 / 25

What’s a likely symptom of a DNS poisoning attack on a local network?

4 / 25

What makes a worm more dangerous than a virus in a networked environment?

5 / 25

What is the primary purpose of a rootkit?

6 / 25

Which type of malware disguises itself as legitimate software?

7 / 25

Ransomware is a form of malware that:

8 / 25

Which of the following is not a characteristic of malware?

9 / 25

Tailgating is an example of:

10 / 25

Shoulder surfing is best prevented by:

11 / 25

Dumpster diving could result in which of the following?

12 / 25

What’s the key difference between phishing and spear phishing?

13 / 25

An attacker sets up a system that intercepts communications between two parties without their knowledge. What attack is this?

14 / 25

How does an evil twin AP attack work?

15 / 25

What is a common indicator of a rogue access point (AP) on a wireless network?

16 / 25

A rogue DHCP server can cause which of the following?

17 / 25

What can result from DNS spoofing?

18 / 25

DNS poisoning involves:

19 / 25

What is the difference between ARP spoofing and ARP poisoning?

20 / 25

ARP poisoning can lead to which type of attack?

21 / 25

Which attack tricks a host into associating an attacker’s MAC address with a legitimate IP address?

22 / 25

In VLAN hopping, an attacker attempts to:

23 / 25

What is the goal of a MAC flooding attack?

24 / 25

What makes a DDoS attack different from a DoS attack?

25 / 25

Which of the following best describes a DoS attack?

Your score is

0%