MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not a type of application layer DoS? |
| A. | HTTP flooding |
| B. | Slowloris |
| C. | TCP flooding |
| D. | DNS query flooding |
| Answer» D. DNS query flooding | |
| 2. |
___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing. |
| A. | Network Layer DoS |
| B. | Physical Layer DoS |
| C. | Transport Layer DoS |
| D. | Application Layer DoS |
| Answer» E. | |
| 3. |
Application layer DoS attack is also known as _______________ |
| A. | Layer4 DoS attack |
| B. | Layer5 DoS attack |
| C. | Layer6 DoS attack |
| D. | Layer7 DoS attack |
| Answer» E. | |
| 4. |
There are ______ types of DoS attack. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 5. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |
| 6. |
APPLICATION_LAYER_DOS_ATTACK_IS_ALSO_KNOWN_AS________________?$ |
| A. | Layer4 DoS attack |
| B. | Layer5 DoS attack |
| C. | Layer6 DoS attack |
| D. | Layer7 DoS attack |
| Answer» E. | |
| 7. |
Which of the following is not a type of application layer DoS?$ |
| A. | HTTP flooding |
| B. | Slowloris |
| C. | TCP flooding |
| D. | DNS query flooding |
| Answer» D. DNS query flooding | |
| 8. |
____________is_a_type_of_DoS_threats_to_overload_a_server_as_it_sends_a_large_number_of_requests_requiring_resources_for_handling_&_processing.$ |
| A. | Network Layer DoS |
| B. | Physical Layer DoS |
| C. | Transport Layer DoS |
| D. | Application Layer DoS |
| Answer» E. | |
| 9. |
A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS). |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
Which of the following do not comes under network layer DoS flooding? |
| A. | UDP flooding |
| B. | HTTP Flooding |
| C. | SYN flooding |
| D. | NTP Amplification |
| Answer» C. SYN flooding | |
| 12. |
Network layer attack is also known as ________________ |
| A. | Layer3-4 DoS attack |
| B. | Layer5 DoS attack |
| C. | Layer6-7 DoS attack |
| D. | Layer2 DoS attack |
| Answer» B. Layer5 DoS attack | |
| 13. |
There are ______ types of DoS attack? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 14. |
Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website. |
| A. | GoS attack |
| B. | PoS attack |
| C. | DDoS attack |
| D. | DoS attack |
| Answer» D. DoS attack | |
| 15. |
DDoS stands for _________________ |
| A. | Direct Distribution of Server |
| B. | Distributed Denial of Service |
| C. | Direct Distribution of Service |
| D. | Distributed Denial of Server |
| Answer» C. Direct Distribution of Service | |
| 16. |
A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a _____________ |
| A. | GoS attack |
| B. | PDoS attack |
| C. | DoS attack |
| D. | DDoS attack |
| Answer» E. | |
| 17. |
DoS is abbreviated as _____________________ |
| A. | Denial of Service |
| B. | Distribution of Server |
| C. | Distribution of Service |
| D. | Denial of Server |
| Answer» B. Distribution of Server | |
| 18. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website.$ |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |
| 19. |
During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
| A. | network |
| B. | system |
| C. | website |
| D. | router |
| Answer» D. router | |
| 20. |
A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |