
MITRE ATT&CK Quiz
Authored by Log Lady
Other
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a tactic in the MITRE ATT&CK framework?
Software Development
Defense Evasion
Data Corruption
Incident Reporting
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a technique under the "Initial Access" tactic?
Privilege Escalation
Spearphishing Link
Command-Line Interface
Input Capture
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under which tactic would you find the technique "Credential Dumping"?
Credential Access
Lateral Movement
Execution
Persistence
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of the "Persistence" tactic in MITRE ATT&CK?
To escalate privileges on a system
To establish and maintain unauthorized access
To execute malicious code
To exfiltrate data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique belongs to the "Execution" tactic?
Process Injection
Account Manipulation
Web Service Exfiltration
Credential Dumping
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of the "Exfiltration" tactic?
To hide malicious activity
To steal data from a target system
To escalate privileges
To move laterally within a network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following techniques is used for "Lateral Movement"?
Pass the Hash
Phishing
Browser Extensions
Data Encoding
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?