Cyberattack Methods 1

Cyberattack Methods 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

Competency 3 Vocabulary

Competency 3 Vocabulary

Professional Development

10 Qs

24. Watering Hole Attack Quiz

24. Watering Hole Attack Quiz

Professional Development

11 Qs

VIRAJES

VIRAJES

Professional Development

10 Qs

Understanding Artificial Intelligence

Understanding Artificial Intelligence

Professional Development

10 Qs

Secuuruhty

Secuuruhty

Professional Development

10 Qs

Artificial Intelligence Key Terms

Artificial Intelligence Key Terms

Professional Development

10 Qs

Main Quiz SIRIM IT DAY 2019

Main Quiz SIRIM IT DAY 2019

Professional Development

20 Qs

Information Security Quiz

Information Security Quiz

Professional Development

15 Qs

Cyberattack Methods 1

Cyberattack Methods 1

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Elankayer Sithirasenan

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between an attack surface and an attack vector?

Attack vector is hardware, attack surface is software

Attack surface includes all potential entry points; vector is the specific method used

Attack vector includes employees, attack surface includes only systems

They are interchangeable terms

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a passive attack?

Modifying system configurations

Encrypting files with ransomware

Monitoring data traffic without altering it

Deleting user data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyberattack method exploits the psychological manipulation of users?

Brute-force attack

Zero-day exploit

Social engineering

Denial-of-service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a common social engineering tactic?

Port scanning

Baiting

Packet sniffing

Firewall bypassing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of phishing targets high-level executives?

Smishing

Whaling

Vishing

Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a zero-trust model, what is assumed about internal users and systems?

They are always trusted

Only administrators are verified

No one is trusted by default

Internal systems are secure by default

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a brute-force attack aim to do?

Crack passwords by trying many combinations

Infect systems with malware

Intercept unencrypted emails

Monitor employee communication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?