Watering Hole Attacks

Watering Hole Attacks

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

7.2.2 - Recon with NSLookup

7.2.2 - Recon with NSLookup

9th - 12th Grade

12 Qs

Internet security

Internet security

11th - 12th Grade

10 Qs

Cyber security

Cyber security

12th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Cybersecurity Awareness

Cybersecurity Awareness

10th Grade

10 Qs

Watering Hole Attacks

Watering Hole Attacks

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Robert Simmons

Used 30+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack should an attacker use who wants to target websites that a group of end users use on a regular basis?

Phishing Attack

Watering Hole Attack

Tailgating Attack

Trojan Horse Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is a watering hole attack directed towards?

Business owners

Common users of a website

System administrators

IT technicians

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What will an attacker develop to trick users during a watering hole attack?

Virus

A fake website

An account

Trojan Horse Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of sites do attackers target for a watering hole attack?

Social Media Sites

Industry-related sites

Magazine sites

Personal sites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When visitors visit a site used for a watering hole attack, how many users are affected?

Only the first visitor

Only the most recent visitor

The closet visitors geographically

All visitors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to stop a watering hole attack is to

Use a spam filter

Use anti-malware software

Use email filtering software

Use website filtering software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before an attacker can exploit a website used by common users, he will

Shut the website down

Design a backdoor

Design a rootkit

Test for weaknesses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?