Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Imagen GIMP

Imagen GIMP

9th - 12th Grade

15 Qs

3.8  Mengevaluasi Perangkat Eksternal / Peripheral (SisKom)

3.8 Mengevaluasi Perangkat Eksternal / Peripheral (SisKom)

10th Grade

20 Qs

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

12th Grade

20 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

CIA Mid-Term Review 1

CIA Mid-Term Review 1

9th - 10th Grade

17 Qs

flowol week 3

flowol week 3

9th - 12th Grade

17 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

JT Ruffin

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Pharming?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Credential Harvesting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Typosquatting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Malware?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?