A tech company recently discovered an attack on its organization, resulting in a significant data breach of customer data. After investigating the attack, they realized it was very sophisticated and likely originated from a foreign country. Which of the following identifies the MOST likely threat actor in this attack?
SEC+ Ch.6 Review Test

Quiz
•
Computers
•
Professional Development
•
Medium

Prem Jadhwani
Used 13+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacktivist
APT
Competitors
Insiders
Answer explanation
B is correct. This was most likely an advanced persistent threat (APT) because it was a sophisticated attack and originated from a foreign country. A hacktivist launches attacks to further a cause, but the scenario didn’t mention any cause. Competitors might launch attacks, but they would typically focus on proprietary data rather than customer data. An insider would not launch attacks from a foreign country.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker purchased an exploit on the Internet. He then used it to modify an item’s price in an online shopping cart during checkout. Which of the following BEST describes this attacker?
Insider
Script Kiddie
Competitor
Hacktivist
APT
Answer explanation
B is correct. A script kiddie will typically obtain a ready-made exploit rather than code it himself. An insider would cause damage from within the network or use inside knowledge when attacking. A competitor is unlikely to purchase a single item at a lower price but would be more interested in gaining proprietary data. Hacktivists launch attacks as part of an activist movement, not to get a better price on an item. An advanced persistent threat (APT) is typically a state actor sponsored by a nation-state and will use advanced tools to launch sophisticated attacks, rather than just lowering a price for an item.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa is a database administrator. She received a phone call from someone identifying himself as a representative from a known hardware vendor. He said he’s calling customers to inform them of a problem with database servers they’ve sold, but he said the problem only affects servers running a specific operating system version. He asks Lisa what operating system versions the company is running on their database servers. Which of the following BEST describes the tactic used by the caller in this scenario?
Pretexting
Tailgating
Pharming
Smishing
Answer explanation
A is correct. The caller is using the social engineering tactic of pretexting by setting up a scenario that has a better chance of getting someone to give him information. If he just asked for the operating system versions on the servers without a prepended scenario, his chance of success would be diminished. Tailgating is the practice of one person following closely behind another without showing credentials. A pharming attack attempts to manipulate the DNS name resolution process. Smishing is a form of phishing using text messages.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker recently attacked a web server hosted by your company.
After investigating the attack, security professionals determined that the attacker used a previously unknown application exploit. Which of the following BEST identifies this attack?
Buffer overflow
Zero-day Attack
Man-in-the-browser
Integer overflow
Answer explanation
B is correct. A zero-day attack takes advantage of an undocumented exploit or an exploit that is unknown to the public. A buffer overflow attack sends unexpected data to a system to access system memory or cause it to crash. Although some buffer overflow attacks are unknown, others are known. If the server isn’t kept up to date with patches, it can be attacked with a known buffer overflow attack. A man-in-the-browser attack is a type of proxy Trojan horse that takes advantage of vulnerabilities in web browsers, not web servers. An integer overflow attack attempts to use or create a numeric value that is too big for an application to handle.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After Bart logged on to his computer, he was unable to access any data. Instead, his screen displayed a message indicating that unless he made a payment, his hard drive would be formatted, and he’d permanently lose access to his data. What does this indicate?
Keylogger
Ransomware
Backdoor
Trojan
Answer explanation
B is correct. Ransomware attempts to take control of user’s system or data and then demands payment (ransom) to return control. Keyloggers capture a user’s keystrokes and store them in a file. This file can be automatically sent to an attacker or manually retrieved depending on the keylogger. It’s possible that Bart’s computer was infected with a Trojan, which created a backdoor. However, not all Trojans or backdoor accounts demand payment as ransom.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recently, malware on a computer at the Monty Burns Casino destroyed several important files after it detected that Homer was no longer employed at the casino. Which of the following BEST identifies this malware?
Logic Bomb
Rootkit
Backdoor
Spyware
Answer explanation
A is correct. A logic bomb executes in response to an event. In this scenario, the logic bomb is delivering its payload when it detects that Homer is no longer employed at the company. A rootkit doesn’t respond to an event. A backdoor provides another method of accessing a system, but it does not delete files. Spyware is software installed on user systems without their awareness or consent.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maggie was on the programming team that developed an application used by your Human Resources department. Personnel use this application to store and manage employee data. Maggie programmed in the ability to access this application with a username and password that only she knows to perform remote maintenance on the application if necessary. Which of the following does this describe?
Virus
Worm
Backdoor
Trojan
Answer explanation
C is correct. A backdoor provides someone an alternative way of accessing a system or application, which is what Maggie created in this scenario. It might seem as though she’s doing so with good intentions, but if attackers discover a backdoor, they can exploit it. A virus is malicious code that attaches itself to an application and executes when the application runs, not code that is purposely written into the application. A worm is selfreplicating malware that travels throughout a network without the assistance of a host application or user interaction. A Trojan is software that looks like it has a beneficial purpose but includes a malicious component.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Computer Networks Quiz

Quiz
•
University - Professi...
10 questions
Security Issues Of Memory Management In Modern Operating Systems

Quiz
•
Professional Development
14 questions
AZ-900 Module 1

Quiz
•
1st Grade - Professio...
15 questions
SEC+ Ch.9 Review Test

Quiz
•
Professional Development
15 questions
SEC+ Ch.7 Review Test

Quiz
•
Professional Development
15 questions
Security+ Study Guide-07 Protecting Against Advanced Attacks

Quiz
•
Professional Development
10 questions
Type of Attack Indicators

Quiz
•
Professional Development
10 questions
CEH Pre Assessment

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade