
CST07 - Cyber Kill Chain and Intro to Active Directory
Authored by Lee Smith
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of the Cyber Kill Chain model?
To classify malware types based on severity
To define stages of a cyber attack for analysis and response
To identify vulnerabilities in hardware components
To rank threat actors by sophistication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of passive reconnaissance?
Running a Nessus vulnerability scan
Sending phishing emails to employees
Searching LinkedIn for employee roles and skills
Attempting to brute-force login credentials
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might an attacker use obfuscated PowerShell commands in a macro-enabled Excel file?
To improve performance of the script
To ensure compatibility with older systems
To evade detection by security tools
To simplify debugging and error handling
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of the Command and Control (C2) stage in the Cyber Kill Chain?
To deliver malware to the target system
To establish communication with compromised systems
To scan for vulnerabilities in external networks
To exfiltrate data from the target environment
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes lateral movement in a cyber attack?
Gaining initial access through phishing
Moving from one compromised system to others within the network
Encrypting files on a single endpoint
Sending spam emails from a hijacked account
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is designed to improve upon NTLM by using ticket-based authentication?
LDAP
Kerberos
RADIUS
SAML
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Actions on Objectives stage of the Cyber Kill Chain typically involve?
Initial scanning of the network
Exploiting a vulnerability
Data exfiltration or ransomware deployment
Sending phishing emails
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?