Search Header Logo
CSF TOPIC 2 PART 3

CSF TOPIC 2 PART 3

Assessment

Presentation

Computers

University

Hard

Created by

PFW .

FREE Resource

18 Slides • 6 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

Multiple Choice

Which of the following is a sign that a website might be spoofed?

1

The URL starts with "https://"

2

The website has a high-quality design

3

The URL contains misspellings or extra characters

4

The website uses a well-known company logo

9

Open Ended

Explain the difference between active sniffing and passive sniffing.

10

media

11

media

12

Multiple Choice

What happens during the weaponization phase?

1

The attacker gathers information about targets

2

The attacker creates a malicious payload

3

The attacker exploits vulnerabilities

4

The attacker conducts reconnaissance

13

media

14

Multiple Choice

What are some methods attackers use to deliver a malicious payload to their targets?

1

Phishing emails

2

Infected attachments

3

Social engineering

4

All of the above

15

media

16

Multiple Choice

Hackers overloading a website with requests in order to attack its availability to other users is called:

1

Denial of Network Attack

2

Denial of Availability Attack

3

Denial of Service Attack

4

Computer Overload Attack

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 24

SLIDE