Level 5 - Threat Agents Quiz

Level 5 - Threat Agents Quiz

7 Qs

quiz-placeholder

Similar activities

PSI: 1 Intro2AAMAS

PSI: 1 Intro2AAMAS

KG - University

4 Qs

I Am Malala Chapter Three

I Am Malala Chapter Three

6th Grade

12 Qs

Hackers

Hackers

KG - University

10 Qs

Video Quiz:  The Cuban Missile Crisis and Kennedy's Presidency

Video Quiz: The Cuban Missile Crisis and Kennedy's Presidency

12th Grade

11 Qs

IZZ 5-3

IZZ 5-3

KG - University

10 Qs

P&A Cycle 2 Quiz

P&A Cycle 2 Quiz

12th Grade

10 Qs

Level 5 - Threat Agents Quiz

Level 5 - Threat Agents Quiz

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between an internal and an external threat agent?
A) An internal threat agent poses a threat from within the organization, while an external threat agent poses a threat from outside the organization.
B) An external threat agent is always more harmful than an internal threat agent.
C) There's no difference between an internal and an external threat agent.
D) An internal threat agent always acts maliciously, while an external threat agent can act either maliciously or non-maliciously.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an advanced persistent threat (APT)?
A) A type of persistent threat where the attacker tries to gain and retain access to the network without being detected.
B) A type of non-persistent threat where the attacker aims for a one-time attack.
C) A threat where the attacker uses open-source intelligence before carrying out the attack.
D) A threat that is carried out by script kiddies to exploit well-known vulnerabilities in systems.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of threat actor?
A) Insider
B) White hat
C) Black hat
D) Data owner

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary motive for nation state attacks?
A) Financial gain
B) To impress their friends or garner attention in the hacking community
C) Obtaining information and/or crippling systems
D) Personal financial gain

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the steps in the strategy hackers use to attack a system?
A) Perform reconnaissance, Use social engineering, Use technical approaches, Breach the system, Escalate privileges, Create a backdoor, Stage computers, Exploit vulnerabilities
B) Perform reconnaissance, Escalate privileges, Breach the system, Use social engineering, Use technical approaches, Create a backdoor, Stage computers, Exploit vulnerabilities
C) Use social engineering, Use technical approaches, Breach the system, Perform reconnaissance, Escalate privileges, Create a backdoor, Stage computers, Exploit vulnerabilities
D) Breach the system, Perform reconnaissance, Use social engineering, Use technical approaches, Escalate privileges, Create a backdoor, Stage computers, Exploit vulnerabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege?
A) A principle that states that users or groups are given only the access they need to do their jobs and nothing more.
B) A principle that states that all users or groups should be given full access to the system.
C) A principle that states that users or groups should be given less access than they need to do their jobs.
D) A principle that states that only the system administrator should have full access to the system.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Randomness" in security refer to?
A) The constant change in personal habits and passwords to prevent predictable behavior.
B) Implementing multiple security strategies to protect the same asset.
C) The use of a variety of methods in implementing defensive layers.
D) The process of making the security measures complex and difficult to understand and use.