

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is not a type of application layer DoS? |
A. | HTTP flooding |
B. | Slowloris |
C. | TCP flooding |
D. | DNS query flooding |
Answer» D. DNS query flooding | |
2. |
___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing. |
A. | Network Layer DoS |
B. | Physical Layer DoS |
C. | Transport Layer DoS |
D. | Application Layer DoS |
Answer» E. | |
3. |
Application layer DoS attack is also known as _______________ |
A. | Layer4 DoS attack |
B. | Layer5 DoS attack |
C. | Layer6 DoS attack |
D. | Layer7 DoS attack |
Answer» E. | |
4. |
There are ______ types of DoS attack. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
5. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |
6. |
APPLICATION_LAYER_DOS_ATTACK_IS_ALSO_KNOWN_AS________________?$ |
A. | Layer4 DoS attack |
B. | Layer5 DoS attack |
C. | Layer6 DoS attack |
D. | Layer7 DoS attack |
Answer» E. | |
7. |
Which of the following is not a type of application layer DoS?$ |
A. | HTTP flooding |
B. | Slowloris |
C. | TCP flooding |
D. | DNS query flooding |
Answer» D. DNS query flooding | |
8. |
____________is_a_type_of_DoS_threats_to_overload_a_server_as_it_sends_a_large_number_of_requests_requiring_resources_for_handling_&_processing.$ |
A. | Network Layer DoS |
B. | Physical Layer DoS |
C. | Transport Layer DoS |
D. | Application Layer DoS |
Answer» E. | |
9. |
A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures. |
A. | True |
B. | False |
Answer» B. False | |
10. |
DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS). |
A. | True |
B. | False |
Answer» B. False | |
11. |
Which of the following do not comes under network layer DoS flooding? |
A. | UDP flooding |
B. | HTTP Flooding |
C. | SYN flooding |
D. | NTP Amplification |
Answer» C. SYN flooding | |
12. |
Network layer attack is also known as ________________ |
A. | Layer3-4 DoS attack |
B. | Layer5 DoS attack |
C. | Layer6-7 DoS attack |
D. | Layer2 DoS attack |
Answer» B. Layer5 DoS attack | |
13. |
There are ______ types of DoS attack? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
14. |
Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website. |
A. | GoS attack |
B. | PoS attack |
C. | DDoS attack |
D. | DoS attack |
Answer» D. DoS attack | |
15. |
DDoS stands for _________________ |
A. | Direct Distribution of Server |
B. | Distributed Denial of Service |
C. | Direct Distribution of Service |
D. | Distributed Denial of Server |
Answer» C. Direct Distribution of Service | |
16. |
A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a _____________ |
A. | GoS attack |
B. | PDoS attack |
C. | DoS attack |
D. | DDoS attack |
Answer» E. | |
17. |
DoS is abbreviated as _____________________ |
A. | Denial of Service |
B. | Distribution of Server |
C. | Distribution of Service |
D. | Denial of Server |
Answer» B. Distribution of Server | |
18. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website.$ |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |
19. |
During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
A. | network |
B. | system |
C. | website |
D. | router |
Answer» D. router | |
20. |
A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |