INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

University

15 Qs

quiz-placeholder

Similar activities

Fraud

Fraud

KG - Professional Development

13 Qs

Quiz PAW 03

Quiz PAW 03

University

12 Qs

Deep Learning CNN

Deep Learning CNN

University

10 Qs

Lesson 5 - Output Handling

Lesson 5 - Output Handling

University

10 Qs

WNS Revision

WNS Revision

University

20 Qs

java script

java script

University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

Quiz on Network and Internet Privacy and Security

Quiz on Network and Internet Privacy and Security

University

20 Qs

INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

Assessment

Quiz

Computers

University

Medium

Created by

Jamelica Bautista

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Attackers send deceptive emails or messages to trick recipients into revealing sensitive information, clicking on malicious links, or downloading malicious attachments.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Injecting malicious scripts into web pages viewed by other users, allowing attackers to steal information or perform actions on behalf of the victim.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Intercepting communication between two parties to eavesdrop, modify, or inject malicious content into the conversation.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting

Phishing

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Can detect possible areas of data leakage or illegal access and assist in determining how data flows across a system.

Data Flow Diagram

DREAD Model

Attack Trees

STRIDE Model

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

S in STRIDE Models stands for what word?

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

E in STRIDE Models stands for what word?

7.

FILL IN THE BLANK QUESTION

1 min • 2 pts

It is the visual representations of potential attack scenarios, with the root node representing the main goal of an attacker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?