Phishing 1

Phishing 1

Professional Development

17 Qs

quiz-placeholder

Similar activities

command prompt

command prompt

4th Grade - Professional Development

15 Qs

Ports

Ports

Professional Development

20 Qs

NM-BIG DATA Course

NM-BIG DATA Course

Professional Development

20 Qs

Digital Technology Office 365 - 29May2020

Digital Technology Office 365 - 29May2020

University - Professional Development

13 Qs

LPC 16 - AIO

LPC 16 - AIO

Professional Development

20 Qs

U.T. 7: Configuración de Routers y Encaminamiento

U.T. 7: Configuración de Routers y Encaminamiento

Professional Development

20 Qs

MS OFFICE QUIZ 01

MS OFFICE QUIZ 01

Professional Development

20 Qs

DW (EM25) - Introducción al Internet [T1]

DW (EM25) - Introducción al Internet [T1]

University - Professional Development

15 Qs

Phishing 1

Phishing 1

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Isabella S

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the followings an attacker can do to perform a phishing attack? (Select all that applies)

Create a malicious payload

Purchase a malicious payload from a malware-as-a-service provider

Purchase a software-as-a-service

Purchase a platform-as-a-service

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does OSINT stand for?

Open Source Intelligence

Open Source Intelligence Network Traffic

Open Server Integration

Open Server Integration Network Traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Backdoor access provides the attacker with access to the system. Which of the following they can NOT do with this access?

Execute malicious code.

Exfiltrate data.

Escalate privileges.

Move laterally across the network.

Evade detection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A threat actor sends an email to the CEO of CYDEO. Their goal is to manipulate the CEO into transferring a large sum of money to them. What type of phishing attack is this?

Whaling

Phishing

CEO Fraud

Spearphishing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the followings, listed the stages of a social engineering attack lifecycle in a correct order?

Reconnaissance

Targeting

Development

Delivery

Exploitation

Installation

Command and Control

Reconnaissance

Targeting

Installation

Delivery

Exploitation

Development

Command and Control

Reconnaissance

Exploitation

Installation

Development

Delivery

Targeting

Command and Control

Reconnaissance

Exploitation

Installation

Development

Delivery

Command and Control

Targeting

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You receive an email from CYDEO saying that your password has expired. There is a link to reset your password. When you check the URL it shows: cycleo.com. What type of link manipulation is this?

Hidden URL

IDN spoofing

Open URL redirector

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Phishing attacks can be associated with which MITRE ATT&CK tactics? (Select all that applies)

Reconnaissance

Resource Development

Initial Access

Execution

Privilege Escalation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?