2.3-General Attack Strategy

2.3-General Attack Strategy

12th Grade

14 Qs

quiz-placeholder

Similar activities

EOPA 2018 Review

EOPA 2018 Review

9th - 12th Grade

18 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Still Images - Review 2

Still Images - Review 2

9th - 12th Grade

9 Qs

Technology LifeSmarts Quiz 7

Technology LifeSmarts Quiz 7

6th - 12th Grade

15 Qs

Linux Chapter 13 Review

Linux Chapter 13 Review

9th - 12th Grade

18 Qs

cybersecurity_5

cybersecurity_5

12th Grade

11 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

TestOut IT Fundamentals Quiz 1

TestOut IT Fundamentals Quiz 1

10th - 12th Grade

17 Qs

2.3-General Attack Strategy

2.3-General Attack Strategy

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of technical exploit?

Virus scan

Port scan

Firewall

Antivirus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another term for a network reconnaissance technique that involves sending ICMP echo requests to a range of IP addresses?

Port scan

Ping sweep

Phishing

Sniffing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the first step in the cyber attack process as mentioned in the summary?

Breaching

Staging

Reconnaissance

Exploiting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the step before 'Exploiting' in the cyber attack process according to the summary?

Reconnaissance

Breaching

Staging

Escalating privileges

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a step in the cyber attack process listed in the summary?

Reconnaissance

Staging

Patching

Breaching

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle depicted in the diagram for a general defense strategy in cybersecurity?

Principle of Maximum Privilege

Principle of Least Privilege

Principle of Shared Responsibility

Principle of Open Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a principle of layered defenses in security?

Increase complexity

Grant all privileges

Defense mechanisms

Avoid randomization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?