CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Quiz - Garden State Cyber Unit 2.1

Quiz - Garden State Cyber Unit 2.1

9th - 12th Grade

9 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Security Devices

Security Devices

10th Grade - University

7 Qs

Cybersecurity Quiz: 5.17 Labs

Cybersecurity Quiz: 5.17 Labs

11th Grade

10 Qs

1.4 Network Threats Recap

1.4 Network Threats Recap

10th Grade

12 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Alicia Pierce

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing any attacker attempts to set up once initial access is achieved?

Lateral movement

C2

Ransomware setup

Reflection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.

LPUs

LLMs

PTRs

RMUs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tailgating another person walking into a corporate office is an example of what?

Social engineering

Social duplication

Social experimentation

Social designing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.

attack area

attack zone

attack surface

attack square

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?

Man-in-the-middle attack

Social engineering attack

Resource exhaustion

Supply chain attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the system used to classify information technology vulnerabilities?

CRE

RPO

RMA

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?

Man-in-the-middle attack

Denial-of-service attack

Social engineering attack

Supply chain attack

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 2013 target attack where data centers were breached using their point of sale (PoS) systems is an example of which type of attack?

Social engineering attack

Denial-of-service attack

Man-in-the-middle attack

Supply chain attack