Phishing 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 5+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)
Create a malicious payload
Purchase a malicious payload from a malware-as-a-service provider
Purchase a software-as-a-service
Purchase a platform-as-a-service
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does OSINT stand for?
Open Source Intelligence
Open Source Intelligence Network Traffic
Open Server Integration
Open Server Integration Network Traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?
Execute malicious code.
Exfiltrate data.
Escalate privileges.
Move laterally across the network.
Evade detection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?
Whaling
Phishing
CEO Fraud
Spearphishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?
Reconnaissance
Targeting
Development
Delivery
Exploitation
Installation
Command and Control
Reconnaissance
Targeting
Installation
Delivery
Exploitation
Development
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Targeting
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Command and Control
Targeting
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?
Hidden URL
IDN spoofing
Open URL redirector
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)
Reconnaissance
Resource Development
Initial Access
Execution
Privilege Escalation
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Intro to internet communication

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
20 questions
CompTIA Sec+

Quiz
•
University - Professi...
20 questions
ITF+ Ch9, Security Concepts & Threats

Quiz
•
Professional Development
20 questions
Cyber Security

Quiz
•
5th Grade - Professio...
20 questions
Quiz Cyber Awareness

Quiz
•
Professional Development
16 questions
Cyber Resilience Training

Quiz
•
Professional Development
20 questions
Pretest Information Security Awareness

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade