Watering Hole Attacks

Watering Hole Attacks

12th Grade

9 Qs

quiz-placeholder

Similar activities

Unit 1 Quiz Prep

Unit 1 Quiz Prep

9th - 12th Grade

13 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

10 Qs

Network Security and Threats Quiz

Network Security and Threats Quiz

12th Grade

10 Qs

Computer Virus

Computer Virus

12th Grade

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

12 Qs

Reconnaissance - Short Quiz

Reconnaissance - Short Quiz

9th - 12th Grade

10 Qs

Watering Hole Attacks

Watering Hole Attacks

Assessment

Quiz

Computers

12th Grade

Medium

Created by

virginia jadav

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a watering hole attack?

A type of attack where attackers directly target an organization's network

A type of attack where attackers infect a third-party website to target users of a specific organization

A type of attack where attackers send malicious emails to users

A type of attack where attackers physically break into an organization's premises

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers change their strategy in response to high-level security in an organization?

They try to physically break into the organization's premises

They try to infect a local sandwich shop

They give up and move on to another target

They focus on infecting a third-party website to target the organization's users

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a watering hole attack?

To steal physical assets from an organization

To physically harm the employees of an organization

To infect a third-party website and gain access to an organization's network

To directly target users of a specific organization with malicious emails

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers try to find vulnerabilities in a third-party site for a watering hole attack?

By physically breaking into the site's premises

By guessing which sites the organization's users visit

By sending malicious emails to the site's visitors

By using a next-generation firewall to scan the site

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of sites were targeted in the example of a watering hole attack in 2017?

Healthcare organizations

Educational institutions

Government agencies

Financial institutions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the payload of the watering hole attack on the financial sites in 2017?

Sending malicious emails to all visitors of the site

Physically harming the visitors of the site

Downloading malicious JavaScript files to all visitors of the site

Downloading malicious JavaScript files only to visitors from specific IP addresses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did Symantec's antivirus software help prevent the watering hole attack on the Polish Financial Supervision Authority site?

It allowed the attackers to access the site but monitored their activities

It physically blocked the attackers from accessing the site

It alerted on a generic JavaScript attack signature and blocked the malicious JavaScript

It sent warnings to the visitors of the site

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one way to prevent a watering hole attack?

Using only one type of security defense

Having a layered defense or defense in depth

Giving outside organizations more access than they should have

Allowing users to click on links inside emails

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a watering hole attack?

To directly target users of a specific organization with malicious emails

To physically harm the employees of an organization

To steal physical assets from an organization

To infect a third-party website and gain access to an organization's network