CCST Attacks and Threats - Chapter 19

Quiz
•
Computers
•
9th - 12th Grade
•
Medium

Alicia Pierce
Used 2+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first thing any attacker attempts to set up once initial access is achieved?
Lateral movement
C2
Ransomware setup
Reflection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.
LPUs
LLMs
PTRs
RMUs
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tailgating another person walking into a corporate office is an example of what?
Social engineering
Social duplication
Social experimentation
Social designing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.
attack area
attack zone
attack surface
attack square
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?
Man-in-the-middle attack
Social engineering attack
Resource exhaustion
Supply chain attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the system used to classify information technology vulnerabilities?
CRE
RPO
RMA
CVE
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?
Man-in-the-middle attack
Denial-of-service attack
Social engineering attack
Supply chain attack
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A 2013 target attack where data centers were breached using their point of sale (PoS) systems is an example of which type of attack?
Social engineering attack
Denial-of-service attack
Man-in-the-middle attack
Supply chain attack
Similar Resources on Wayground
8 questions
Cybersecurity Lesson 1

Quiz
•
12th Grade
10 questions
G11 IT Security L2

Quiz
•
12th Grade
11 questions
2.5 Social Engineering -2

Quiz
•
12th Grade
10 questions
Y8 Computer crime 2

Quiz
•
7th - 9th Grade
10 questions
TLU8- Social Implications

Quiz
•
11th Grade
10 questions
Cyber security

Quiz
•
12th Grade
10 questions
Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Quiz
•
9th Grade - University
10 questions
IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade