MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Statistics Quiz

Statistics Quiz

University - Professional Development

10 Qs

Quizizz - Finance Directorate Event

Quizizz - Finance Directorate Event

Professional Development

10 Qs

Women Achievers

Women Achievers

Professional Development

10 Qs

Arknights quiz 2

Arknights quiz 2

Professional Development

11 Qs

Vesteria Quiz

Vesteria Quiz

Professional Development

11 Qs

Drive Thru Lane Sensor

Drive Thru Lane Sensor

University - Professional Development

10 Qs

XL7 juara

XL7 juara

Professional Development

14 Qs

Bloom's Taxonomy Refresh

Bloom's Taxonomy Refresh

Professional Development

10 Qs

MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Log Lady

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a tactic in the MITRE ATT&CK framework?

Software Development

Defense Evasion

Data Corruption

Incident Reporting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a technique under the "Initial Access" tactic?

Privilege Escalation

Spearphishing Link

Command-Line Interface

Input Capture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which tactic would you find the technique "Credential Dumping"?

Credential Access

Lateral Movement

Execution

Persistence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of the "Persistence" tactic in MITRE ATT&CK?

To escalate privileges on a system

To establish and maintain unauthorized access

To execute malicious code

To exfiltrate data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique belongs to the "Execution" tactic?

Process Injection

Account Manipulation

Web Service Exfiltration

Credential Dumping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the "Exfiltration" tactic?

To hide malicious activity

To steal data from a target system

To escalate privileges

To move laterally within a network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is used for "Lateral Movement"?

Pass the Hash

Phishing

Browser Extensions

Data Encoding

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?