CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Social Engineering

Social Engineering

11th Grade

12 Qs

Lesson 5 - Network Threats

Lesson 5 - Network Threats

9th Grade

13 Qs

Social Engineering Game

Social Engineering Game

9th - 12th Grade

12 Qs

Network Security Revision

Network Security Revision

11th Grade

10 Qs

Cyber security quizlet

Cyber security quizlet

8th - 9th Grade

10 Qs

Cyber security

Cyber security

12th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

11th Grade

13 Qs

Network security

Network security

8th - 9th Grade

10 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Alicia Pierce

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing any attacker attempts to set up once initial access is achieved?

Lateral movement

C2

Ransomware setup

Reflection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.

LPUs

LLMs

PTRs

RMUs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tailgating another person walking into a corporate office is an example of what?

Social engineering

Social duplication

Social experimentation

Social designing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.

attack area

attack zone

attack surface

attack square

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?

Man-in-the-middle attack

Social engineering attack

Resource exhaustion

Supply chain attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the system used to classify information technology vulnerabilities?

CRE

RPO

RMA

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?

Man-in-the-middle attack

Denial-of-service attack

Social engineering attack

Supply chain attack

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 2013 target attack where data centers were breached using their point of sale (PoS) systems is an example of which type of attack?

Social engineering attack

Denial-of-service attack

Man-in-the-middle attack

Supply chain attack