Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)
Phishing 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 5+ times
FREE Resource
17 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Create a malicious payload
Purchase a malicious payload from a malware-as-a-service provider
Purchase a software-as-a-service
Purchase a platform-as-a-service
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does OSINT stand for?
Open Source Intelligence
Open Source Intelligence Network Traffic
Open Server Integration
Open Server Integration Network Traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?
Execute malicious code.
Exfiltrate data.
Escalate privileges.
Move laterally across the network.
Evade detection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?
Whaling
Phishing
CEO Fraud
Spearphishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?
Reconnaissance
Targeting
Development
Delivery
Exploitation
Installation
Command and Control
Reconnaissance
Targeting
Installation
Delivery
Exploitation
Development
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Targeting
Command and Control
Reconnaissance
Exploitation
Installation
Development
Delivery
Command and Control
Targeting
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?
Hidden URL
IDN spoofing
Open URL redirector
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)
Reconnaissance
Resource Development
Initial Access
Execution
Privilege Escalation
Create a free account and access millions of resources
Similar Resources on Quizizz
13 questions
SECURITY AWARENS

Quiz
•
University - Professi...
15 questions
SEC+ Ch.6 Review Test

Quiz
•
Professional Development
15 questions
Google Cloud Digital Leader - common knowledge sort of

Quiz
•
Professional Development
15 questions
ISC2 - Chapter 4 - Module 2

Quiz
•
Professional Development
12 questions
Security I - Day 3 - Review of Day 2

Quiz
•
Professional Development
15 questions
Cybersecurity & Phishing Quiz

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
20 questions
CompTIA Sec+

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade