CCST Attacks and Threats - Chapter 19

Quiz
•
Computers
•
9th - 12th Grade
•
Medium

Alicia Pierce
Used 2+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first thing any attacker attempts to set up once initial access is achieved?
Lateral movement
C2
Ransomware setup
Reflection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.
LPUs
LLMs
PTRs
RMUs
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tailgating another person walking into a corporate office is an example of what?
Social engineering
Social duplication
Social experimentation
Social designing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.
attack area
attack zone
attack surface
attack square
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?
Man-in-the-middle attack
Social engineering attack
Resource exhaustion
Supply chain attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the system used to classify information technology vulnerabilities?
CRE
RPO
RMA
CVE
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?
Man-in-the-middle attack
Denial-of-service attack
Social engineering attack
Supply chain attack
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A 2013 target attack where data centers were breached using their point of sale (PoS) systems is an example of which type of attack?
Social engineering attack
Denial-of-service attack
Man-in-the-middle attack
Supply chain attack
Similar Resources on Wayground
10 questions
Network Security [OCR GCSE]

Quiz
•
10th Grade
10 questions
Cybersecurity 2 Chapter 1 Quiz

Quiz
•
9th - 12th Grade
9 questions
cybersecurity threats

Quiz
•
10th Grade
6 questions
Computer Threats

Quiz
•
10th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
10 questions
Chapter 7: Risk, Reputation, & Crisis Review (1)

Quiz
•
12th Grade
10 questions
DNS Spoofing / posioning Quiz

Quiz
•
11th Grade
10 questions
Cybersecurity Attack Types Quiz

Quiz
•
5th Grade - University
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)

Quiz
•
9th Grade
15 questions
MLA Formatting

Quiz
•
9th Grade
20 questions
Typing Practice

Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz

Quiz
•
9th Grade