
General attack strategy
Interactive Video
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Easy
Dorothy Hill
Used 1+ times
FREE Resource
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in a general attack strategy?
Staging
Escalating privileges
Reconnaissance
Exploiting
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is commonly used by attackers to find open ports on a system?
Ping sweep
Dumpster diving
Nmap utility
Social media
3.
MULTIPLE CHOICE QUESTION
30 sec • Ungraded
Are you enjoying the video lesson?
Yes
No
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What might an attacker use to gain access through a technical exploit?
Sympathetic approach
Buffer overflow
Dumpster diving
Aggressive emails
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a backdoor in the context of a cyber attack?
A way to gain initial access
A method to escalate privileges
An easy way to access the system again
A tool for reconnaissance
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the final step in a general attack strategy?
Reconnaissance
Breaching
Exploiting
Staging
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade