Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)
Phishing 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 5+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Create a malicious payload
Purchase a malicious payload from a malware-as-a-service provider
Purchase a software-as-a-service
Purchase a platform-as-a-service
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does OSINT stand for?
Open Source Intelligence
Open Source Intelligence Network Traffic
Open Server Integration
Open Server Integration Network Traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?
Execute malicious code.
Exfiltrate data.
Escalate privileges.
Move laterally across the network.
Evade detection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?
Whaling
Phishing
CEO Fraud
Spearphishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?
Reconnaissance
Targeting
Development
Delivery
Exploitation
Installation
Command and Control
Reconnaissance
Targeting
Installation
Delivery
Exploitation
Development
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Targeting
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Command and Control
Targeting
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?
Hidden URL
IDN spoofing
Open URL redirector
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)
Reconnaissance
Resource Development
Initial Access
Execution
Privilege Escalation
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Quiz Cyber Awareness

Quiz
•
Professional Development
16 questions
Cyber Resilience Training

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
20 questions
Pretest Information Security Awareness

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
15 questions
SEC+ Ch.6 Review Test

Quiz
•
Professional Development
15 questions
Google Cloud Digital Leader - common knowledge sort of

Quiz
•
Professional Development
15 questions
R&D Days

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade