Phishing 1
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Medium
Isabella S
Used 5+ times
FREE Resource
Enhance your content in a minute
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)
Create a malicious payload
Purchase a malicious payload from a malware-as-a-service provider
Purchase a software-as-a-service
Purchase a platform-as-a-service
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does OSINT stand for?
Open Source Intelligence
Open Source Intelligence Network Traffic
Open Server Integration
Open Server Integration Network Traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?
Execute malicious code.
Exfiltrate data.
Escalate privileges.
Move laterally across the network.
Evade detection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?
Whaling
Phishing
CEO Fraud
Spearphishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?
Reconnaissance
Targeting
Development
Delivery
Exploitation
Installation
Command and Control
Reconnaissance
Targeting
Installation
Delivery
Exploitation
Development
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Targeting
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Command and Control
Targeting
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?
Hidden URL
IDN spoofing
Open URL redirector
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)
Reconnaissance
Resource Development
Initial Access
Execution
Privilege Escalation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
js DOM
Quiz
•
12th Grade - Professi...
13 questions
Javascript HTML CSS
Quiz
•
Professional Development
15 questions
Sensibilisation sécurité informatique
Quiz
•
Professional Development
16 questions
Photoshop tools
Quiz
•
6th Grade - Professio...
16 questions
DECI - Week 13 - round
Quiz
•
Professional Development
14 questions
DECI - Week 15 - round
Quiz
•
Professional Development
12 questions
DECI - Week 6 - round
Quiz
•
Professional Development
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...
