
Incident Handling 2
Authored by Jason Webb
Instructional Technology
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This malware type replicates without human intervention:
trojan
virus
ransomware
worm
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker registers the domain chasrbank[.]com. What type of attack is this?
Pass the hash
DNS poisoning
Typosquatting
Redirection
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are behavioral indicators of a computer worm (select all that apply)?
new accounts created
performance issues on the system
corrupt files
unknown emails
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are indications of a ransomware infection (Select all that apply)?
replication
backup deletion
ransom note
encrypted files
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A popular tool to conduct "Pass the Hash" and related attacks.
Kali
Hydra
Cain and Abel
Mimikatz
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which indicator type can NOT be searched in VirusTotal?
file hash
email sender
domain
IP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of Trojan focuses on redirecting victims to fraudulent financial sites in order to steal information?
RATs
Banking Trojan
AV Trojan
Backdoors
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?