Phishing 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 5+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)
Create a malicious payload
Purchase a malicious payload from a malware-as-a-service provider
Purchase a software-as-a-service
Purchase a platform-as-a-service
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does OSINT stand for?
Open Source Intelligence
Open Source Intelligence Network Traffic
Open Server Integration
Open Server Integration Network Traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?
Execute malicious code.
Exfiltrate data.
Escalate privileges.
Move laterally across the network.
Evade detection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?
Whaling
Phishing
CEO Fraud
Spearphishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?
Reconnaissance
Targeting
Development
Delivery
Exploitation
Installation
Command and Control
Reconnaissance
Targeting
Installation
Delivery
Exploitation
Development
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Targeting
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Command and Control
Targeting
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?
Hidden URL
IDN spoofing
Open URL redirector
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)
Reconnaissance
Resource Development
Initial Access
Execution
Privilege Escalation
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
D&TO Quiz

Quiz
•
Professional Development
12 questions
Threats and Risks

Quiz
•
Professional Development
20 questions
CompTIA Sec+

Quiz
•
University - Professi...
20 questions
ITF+ Ch9, Security Concepts & Threats

Quiz
•
Professional Development
20 questions
Cyber Security

Quiz
•
5th Grade - Professio...
12 questions
Phishing Micro Workshop Quiz

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
15 questions
Intro to internet communication

Quiz
•
Professional Development
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
14 questions
Disney Trivia

Quiz
•
Professional Development
14 questions
2019 Logos

Quiz
•
Professional Development
7 questions
How to Email your Teacher

Quiz
•
Professional Development
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Employability Skills

Quiz
•
Professional Development