CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

DNS Spoofing / posioning Quiz

DNS Spoofing / posioning Quiz

11th Grade

10 Qs

CC 6:11 - 6:13 Terms

CC 6:11 - 6:13 Terms

9th Grade

10 Qs

Internet Security

Internet Security

9th - 11th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Staying Safe on the Internet

Staying Safe on the Internet

10th - 12th Grade

10 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Alicia Pierce

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first thing any attacker attempts to set up once initial access is achieved?

Lateral movement

C2

Ransomware setup

Reflection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can be used to assemble authentic-looking documents, such as emails; an attacker can use them to fool users.

LPUs

LLMs

PTRs

RMUs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tailgating another person walking into a corporate office is an example of what?

Social engineering

Social duplication

Social experimentation

Social designing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network, the __________ includes the points in a network that connect to the Internet, an external system, or any place where it attaches to users.

attack area

attack zone

attack surface

attack square

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an attacker sends a series of DNS queries fast enough to fill a recursive server’s cache, what attack is it considered?

Man-in-the-middle attack

Social engineering attack

Resource exhaustion

Supply chain attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the system used to classify information technology vulnerabilities?

CRE

RPO

RMA

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack occurs when a third-party device is logically inserted into a forwarding path to steal information?

Man-in-the-middle attack

Denial-of-service attack

Social engineering attack

Supply chain attack

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 2013 target attack where data centers were breached using their point of sale (PoS) systems is an example of which type of attack?

Social engineering attack

Denial-of-service attack

Man-in-the-middle attack

Supply chain attack