AAQ IT Unit 2 A2.2 Attack Vectors

AAQ IT Unit 2 A2.2 Attack Vectors

11th - 12th Grade

40 Qs

quiz-placeholder

Similar activities

Creating a Secure System (5.8 - 5.11)

Creating a Secure System (5.8 - 5.11)

9th - 12th Grade

40 Qs

storage devices

storage devices

8th - 11th Grade

36 Qs

Computers 101 Quiz: What do you know?

Computers 101 Quiz: What do you know?

9th - 12th Grade

40 Qs

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

12th Grade

44 Qs

Chapter 2 Basic Switch/Router Configuration

Chapter 2 Basic Switch/Router Configuration

11th Grade

40 Qs

IT Fun 1.0 Concepts and Terms

IT Fun 1.0 Concepts and Terms

11th - 12th Grade

42 Qs

OCR Computer Science 1.1.1

OCR Computer Science 1.1.1

9th - 11th Grade

40 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

45 Qs

AAQ IT Unit 2 A2.2 Attack Vectors

AAQ IT Unit 2 A2.2 Attack Vectors

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Created by

Jen Reece

FREE Resource

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of an attack vector used by cybercriminals?

Physical attacks

Social engineering

Malware

Web-based

Network-based

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: An attack vector describes the methods that a cybercriminal uses to exploit a _________

security vulnerability

network cable

user password

firewall rule

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the total number of possible attack vectors called?

Attack surface

Threat model

Security perimeter

Vulnerability index

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack vectors can only be external to an organisation.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of an attack vector?

Network-based

Web-based

Malware

Social engineering

Strong password policy

6.

MATCH QUESTION

30 sec • 1 pt

Match the following attack vectors to their descriptions:

Physical access to systems

Social engineering

Exploiting human psychology

Malware

Exploiting network vulnerabilities

Physical attacks

Malicious software

Web-based

Attacks via websites

Network-based

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: An attacker doesn't need to decrypt or read the data — instead, they passively eavesdrop on ________, timing, frequency, and volume of traffic.

packet size

encryption key

user credentials

IP address

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?