MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Kuis 25 September 2023

Kuis 25 September 2023

Professional Development

11 Qs

Skin Care Training Session 3

Skin Care Training Session 3

Professional Development

10 Qs

What's it like to be a teacher?

What's it like to be a teacher?

Professional Development

5 Qs

[POST-TEST SUSULAN] PT Bina Pertiwi Training

[POST-TEST SUSULAN] PT Bina Pertiwi Training

Professional Development

15 Qs

JuJutsu Kaisen

JuJutsu Kaisen

KG - Professional Development

5 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

VRQ L3 Perming recap - Theory

VRQ L3 Perming recap - Theory

Professional Development

10 Qs

Big Nate quiz

Big Nate quiz

KG - Professional Development

11 Qs

MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Log Lady

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a tactic in the MITRE ATT&CK framework?

Software Development

Defense Evasion

Data Corruption

Incident Reporting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a technique under the "Initial Access" tactic?

Privilege Escalation

Spearphishing Link

Command-Line Interface

Input Capture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which tactic would you find the technique "Credential Dumping"?

Credential Access

Lateral Movement

Execution

Persistence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of the "Persistence" tactic in MITRE ATT&CK?

To escalate privileges on a system

To establish and maintain unauthorized access

To execute malicious code

To exfiltrate data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique belongs to the "Execution" tactic?

Process Injection

Account Manipulation

Web Service Exfiltration

Credential Dumping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the "Exfiltration" tactic?

To hide malicious activity

To steal data from a target system

To escalate privileges

To move laterally within a network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is used for "Lateral Movement"?

Pass the Hash

Phishing

Browser Extensions

Data Encoding

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?