Search Header Logo

MITRE ATT&CK Quiz

Authored by Log Lady

Other

Professional Development

MITRE ATT&CK Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a tactic in the MITRE ATT&CK framework?

Software Development

Defense Evasion

Data Corruption

Incident Reporting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a technique under the "Initial Access" tactic?

Privilege Escalation

Spearphishing Link

Command-Line Interface

Input Capture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which tactic would you find the technique "Credential Dumping"?

Credential Access

Lateral Movement

Execution

Persistence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of the "Persistence" tactic in MITRE ATT&CK?

To escalate privileges on a system

To establish and maintain unauthorized access

To execute malicious code

To exfiltrate data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique belongs to the "Execution" tactic?

Process Injection

Account Manipulation

Web Service Exfiltration

Credential Dumping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the "Exfiltration" tactic?

To hide malicious activity

To steal data from a target system

To escalate privileges

To move laterally within a network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is used for "Lateral Movement"?

Pass the Hash

Phishing

Browser Extensions

Data Encoding

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?