Understanding Attacks

Understanding Attacks

14 Qs

quiz-placeholder

Similar activities

Science Exam Reviewer Part 3

Science Exam Reviewer Part 3

8th Grade

10 Qs

I Am Malala Chapter Four

I Am Malala Chapter Four

6th Grade

13 Qs

Year 2 History Pre-Assessment Quiz!

Year 2 History Pre-Assessment Quiz!

KG - University

15 Qs

CCFC1 Q Crash Course Film: Citizen Kane

CCFC1 Q Crash Course Film: Citizen Kane

8th Grade

10 Qs

P&A Cycle 2 Quiz

P&A Cycle 2 Quiz

12th Grade

10 Qs

Protagonists and Antagonists in storytelling

Protagonists and Antagonists in storytelling

KG - University

10 Qs

Emic and Etic Approaches

Emic and Etic Approaches

10th Grade

16 Qs

Understanding Attacks

Understanding Attacks

Assessment

Quiz

others

Medium

Created by

Angel Martinez

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat actor often has direct access to an organization’s internal systems?
internal threat actor
external threat actor
social engineering
exfiltration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which category refers to systems that no longer receive updates or support from vendors?
Unintentional Insider Threat
Shadow IT
Vulnerable Software
Unsupported Systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What category includes configurations that could potentially allow unauthorized access to the network?
Unintentional Insider Threat
Shadow IT
Vulnerable Software
Unsupported Systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is likely to exploit vulnerabilities from outside the organization's network?
internal threat actor
external threat actor
social engineering
exfiltration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of threat actor might have advanced skills and tools to carry out complex attacks?
Level of Sophistication/Capability
script kiddie
exfiltration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker who uses phishing attacks and social engineering is often considered which type?
external threat actor
internal threat actor
war driving
phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What refers to the act of manipulating financial records for personal gain?
employment
internal actor
fraud
corporate america

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?