
2.3-General Attack Strategy
Authored by Amy Austin
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of technical exploit?
Virus scan
Port scan
Firewall
Antivirus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is another term for a network reconnaissance technique that involves sending ICMP echo requests to a range of IP addresses?
Port scan
Ping sweep
Phishing
Sniffing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the first step in the cyber attack process as mentioned in the summary?
Breaching
Staging
Reconnaissance
Exploiting
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the step before 'Exploiting' in the cyber attack process according to the summary?
Reconnaissance
Breaching
Staging
Escalating privileges
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a step in the cyber attack process listed in the summary?
Reconnaissance
Staging
Patching
Breaching
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the principle depicted in the diagram for a general defense strategy in cybersecurity?
Principle of Maximum Privilege
Principle of Least Privilege
Principle of Shared Responsibility
Principle of Open Access
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a principle of layered defenses in security?
Increase complexity
Grant all privileges
Defense mechanisms
Avoid randomization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?