General attack strategy

General attack strategy

Assessment

Interactive Video

Computers

9th - 12th Grade

Easy

Created by

Dorothy Hill

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in a general attack strategy?

Staging

Escalating privileges

Reconnaissance

Exploiting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is commonly used by attackers to find open ports on a system?

Ping sweep

Dumpster diving

Nmap utility

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Are you enjoying the video lesson?

Yes

No

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What might an attacker use to gain access through a technical exploit?

Sympathetic approach

Buffer overflow

Dumpster diving

Aggressive emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a backdoor in the context of a cyber attack?

A way to gain initial access

A method to escalate privileges

An easy way to access the system again

A tool for reconnaissance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the final step in a general attack strategy?

Reconnaissance

Breaching

Exploiting

Staging