Quiz 1.4: Network Security
Which of the following is a physical prevention method?
What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
The weakest link in any system is the…
A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
What is the name of the protocol that allows files to be securely transferred between computers over a network?
What are infected computers participating in a botnet typically referred to as?
What is the term for the process of verifying the identity of a user or device?
An untargetted scam message asking for help, randomly sent to many recipients, is a ______ scam.
Which type of attack typically uses a botnet?
Which of the following is not a method of protection from a man-in-the-middle attack?