AAQ IT Unit 2 A2.2 Attack Vectors

AAQ IT Unit 2 A2.2 Attack Vectors

11th - 12th Grade

40 Qs

quiz-placeholder

Similar activities

Ôn Tập Học Kì I Lớp 4

Ôn Tập Học Kì I Lớp 4

4th Grade - University

35 Qs

Digital and Information Systems (VAC)

Digital and Information Systems (VAC)

12th Grade

42 Qs

MIL_1ST_QUIZ

MIL_1ST_QUIZ

12th Grade

35 Qs

TJBL WAN KLS 11 SINIU

TJBL WAN KLS 11 SINIU

11th Grade

45 Qs

Trắc nghiệm MS Excel (P1) - Nghề Tin học - Lớp 11

Trắc nghiệm MS Excel (P1) - Nghề Tin học - Lớp 11

11th Grade

40 Qs

Networking Essentials - Ch 4 Media

Networking Essentials - Ch 4 Media

11th - 12th Grade

44 Qs

Microsoft Excels: Formulas and Functions

Microsoft Excels: Formulas and Functions

12th Grade - University

45 Qs

Administrasi Infrakstruktur Jaringan

Administrasi Infrakstruktur Jaringan

11th Grade

35 Qs

AAQ IT Unit 2 A2.2 Attack Vectors

AAQ IT Unit 2 A2.2 Attack Vectors

Assessment

Quiz

Computers

11th - 12th Grade

Practice Problem

Easy

Created by

Jen Reece

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of an attack vector used by cybercriminals?

Physical attacks

Social engineering

Malware

Web-based

Network-based

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: An attack vector describes the methods that a cybercriminal uses to exploit a _________

security vulnerability

network cable

user password

firewall rule

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the total number of possible attack vectors called?

Attack surface

Threat model

Security perimeter

Vulnerability index

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack vectors can only be external to an organisation.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of an attack vector?

Network-based

Web-based

Malware

Social engineering

Strong password policy

6.

MATCH QUESTION

30 sec • 1 pt

Match the following attack vectors to their descriptions:

Exploiting human psychology

Web-based

Physical access to systems

Network-based

Exploiting network vulnerabilities

Social engineering

Malicious software

Malware

Attacks via websites

Physical attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: An attacker doesn't need to decrypt or read the data — instead, they passively eavesdrop on ________, timing, frequency, and volume of traffic.

packet size

encryption key

user credentials

IP address

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?