Watering Hole Attacks

Watering Hole Attacks

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Internet Vocabulary Notebook Check #2 - CTEA

Internet Vocabulary Notebook Check #2 - CTEA

12th Grade

11 Qs

Password Hacking Techniques

Password Hacking Techniques

9th Grade - University

14 Qs

SQL Injection

SQL Injection

10th Grade

10 Qs

Cyber Security Recap

Cyber Security Recap

10th Grade

12 Qs

Impact of Security Breaches

Impact of Security Breaches

11th Grade

15 Qs

Network Attacks

Network Attacks

9th - 12th Grade

15 Qs

Cybersecurity Scenarios

Cybersecurity Scenarios

12th Grade

10 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

Watering Hole Attacks

Watering Hole Attacks

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Robert Simmons

Used 30+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack should an attacker use who wants to target websites that a group of end users use on a regular basis?

Phishing Attack

Watering Hole Attack

Tailgating Attack

Trojan Horse Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is a watering hole attack directed towards?

Business owners

Common users of a website

System administrators

IT technicians

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What will an attacker develop to trick users during a watering hole attack?

Virus

A fake website

An account

Trojan Horse Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of sites do attackers target for a watering hole attack?

Social Media Sites

Industry-related sites

Magazine sites

Personal sites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When visitors visit a site used for a watering hole attack, how many users are affected?

Only the first visitor

Only the most recent visitor

The closet visitors geographically

All visitors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to stop a watering hole attack is to

Use a spam filter

Use anti-malware software

Use email filtering software

Use website filtering software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before an attacker can exploit a website used by common users, he will

Shut the website down

Design a backdoor

Design a rootkit

Test for weaknesses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?