Sec+:  Types of attacks

Sec+: Types of attacks

Professional Development

10 Qs

quiz-placeholder

Similar activities

Module #4 Nervous System

Module #4 Nervous System

Professional Development

8 Qs

Insider Threats Quiz

Insider Threats Quiz

Professional Development

15 Qs

Phishing - Learning Tales

Phishing - Learning Tales

Professional Development

10 Qs

Cyber Fraud Training

Cyber Fraud Training

Professional Development

10 Qs

Cyber Thursday - Broken Authentication

Cyber Thursday - Broken Authentication

Professional Development

10 Qs

Secure Coding Training Quiz

Secure Coding Training Quiz

Professional Development

10 Qs

WCS 1106-1 - Knowledge Assessment

WCS 1106-1 - Knowledge Assessment

Professional Development

15 Qs

Driver Account Takeover

Driver Account Takeover

Professional Development

7 Qs

Sec+:  Types of attacks

Sec+: Types of attacks

Assessment

Quiz

Other

Professional Development

Hard

Created by

Brent Bretherick

Used 65+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of social engineering attack usually takes advantage of spammed email being sent out to a specific person or group of unsuspecting recipients?

Vishing

Smishing

Whaling

Spear Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A misleading web address that targets a user incorrectly typing the website’s name directly in the address bar of their browser is referred to this type of attack.

URL hijacking

Phishing

Impersonation

Spamming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This kind of attack can occur when a person is performing sensitive work on a laptop in a public area such as a coffee shop

Piggybacking

Dumpster diving

Shoulder surfing

Smurfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An evil twin is mostly likely a part of this kind of attack.

Botnet

Phishing

Man-in-the-middle

Zero day

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack takes advantage of an applications vulnerability of not being patched?

DDoS

Pharming

Smurf

Zero day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This wireless attack sends unsolicited messages to a Bluetooth enabled device.

Bluejacking

Bluesnarfing

Jamming

Bluebugging

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which application attacks directly target the database programs sitting behind the web content servers?

SQL injection

Session hijacking

Cross-site scripting

Command injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?