CST07 - Cyber Kill Chain and Intro to Active Directory

CST07 - Cyber Kill Chain and Intro to Active Directory

Professional Development

12 Qs

quiz-placeholder

Similar activities

MR ELKANA

MR ELKANA

Professional Development

7 Qs

PDSB 210622

PDSB 210622

University - Professional Development

10 Qs

WEB HOSTING QUIZ

WEB HOSTING QUIZ

Professional Development

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

ITF - Quiz 9.5 - DNS and URLs

ITF - Quiz 9.5 - DNS and URLs

Professional Development

15 Qs

LATIHAN 1

LATIHAN 1

Professional Development

15 Qs

PreTest TKJ BLPT

PreTest TKJ BLPT

11th Grade - Professional Development

10 Qs

ASJ-11 (Latihan1)

ASJ-11 (Latihan1)

Professional Development

10 Qs

CST07 - Cyber Kill Chain and Intro to Active Directory

CST07 - Cyber Kill Chain and Intro to Active Directory

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Lee Smith

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the Cyber Kill Chain model?

To classify malware types based on severity

To define stages of a cyber attack for analysis and response

To identify vulnerabilities in hardware components

To rank threat actors by sophistication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Running a Nessus vulnerability scan

Sending phishing emails to employees

Searching LinkedIn for employee roles and skills

Attempting to brute-force login credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might an attacker use obfuscated PowerShell commands in a macro-enabled Excel file?

To improve performance of the script

To ensure compatibility with older systems

To evade detection by security tools

To simplify debugging and error handling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the Command and Control (C2) stage in the Cyber Kill Chain?

To deliver malware to the target system

To establish communication with compromised systems

To scan for vulnerabilities in external networks

To exfiltrate data from the target environment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes lateral movement in a cyber attack?

Gaining initial access through phishing

Moving from one compromised system to others within the network

Encrypting files on a single endpoint

Sending spam emails from a hijacked account

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is designed to improve upon NTLM by using ticket-based authentication?

LDAP

Kerberos

RADIUS

SAML

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Actions on Objectives stage of the Cyber Kill Chain typically involve?

Initial scanning of the network

Exploiting a vulnerability

Data exfiltration or ransomware deployment

Sending phishing emails

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?