CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Mark Zuckerberg

Mark Zuckerberg

10th - 12th Grade

10 Qs

MEDIA AND INFORMATION LITERACY

MEDIA AND INFORMATION LITERACY

12th Grade

10 Qs

พระราชบัญญัติ การรักษาความมั่นคง ปลอดภัยไซเบอร์ พ.ศ. 2562

พระราชบัญญัติ การรักษาความมั่นคง ปลอดภัยไซเบอร์ พ.ศ. 2562

12th Grade

10 Qs

Part 2: The Internet and its Programs

Part 2: The Internet and its Programs

12th Grade

10 Qs

Herramientas WEB

Herramientas WEB

6th Grade - Professional Development

11 Qs

latihan

latihan

9th Grade

10 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

computer security

computer security

KG - 12th Grade

12 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Alicia Pierce

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing any attacker attempts to set up once initial access is achieved?

Lateral movement

C2

Ransomware setup

Reflection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.

LPUs

LLMs

PTRs

RMUs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tailgating another person walking into a corporate office is an example of what?

Social engineering

Social duplication

Social experimentation

Social designing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.

attack area

attack zone

attack surface

attack square

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?

Man-in-the-middle attack

Social engineering attack

Resource exhaustion

Supply chain attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the system used to classify information technology vulnerabilities?

CRE

RPO

RMA

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?

Man-in-the-middle attack

Denial-of-service attack

Social engineering attack

Supply chain attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?