2.3-General Attack Strategy

2.3-General Attack Strategy

12th Grade

14 Qs

quiz-placeholder

Similar activities

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

Technical Terms - Internet (A-Z) - Keep-Alive

Technical Terms - Internet (A-Z) - Keep-Alive

12th Grade

10 Qs

Network Security Risks

Network Security Risks

12th Grade

10 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

12th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

Characteristics of Entrepreneurs

Characteristics of Entrepreneurs

6th - 12th Grade

10 Qs

2.3-General Attack Strategy

2.3-General Attack Strategy

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of technical exploit?

Virus scan

Port scan

Firewall

Antivirus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for a network reconnaissance technique that involves sending ICMP echo requests to a range of IP addresses?

Port scan

Ping sweep

Phishing

Sniffing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the first step in the cyber attack process as mentioned in the summary?

Breaching

Staging

Reconnaissance

Exploiting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the step before 'Exploiting' in the cyber attack process according to the summary?

Reconnaissance

Breaching

Staging

Escalating privileges

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a step in the cyber attack process listed in the summary?

Reconnaissance

Staging

Patching

Breaching

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle depicted in the diagram for a general defense strategy in cybersecurity?

Principle of Maximum Privilege

Principle of Least Privilege

Principle of Shared Responsibility

Principle of Open Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a principle of layered defenses in security?

Increase complexity

Grant all privileges

Defense mechanisms

Avoid randomization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?