MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Leadership Style

Leadership Style

Professional Development

10 Qs

Salesforce

Salesforce

1st Grade - Professional Development

8 Qs

Competing Paradigms in Consumer Behaviour

Competing Paradigms in Consumer Behaviour

Professional Development

11 Qs

Guidance and counseling

Guidance and counseling

University - Professional Development

15 Qs

Wellness Trivia

Wellness Trivia

Professional Development

15 Qs

vocab #16

vocab #16

KG - Professional Development

10 Qs

Its Time To Bounce Back

Its Time To Bounce Back

Professional Development

15 Qs

Brown Bag : MINI GAME 1 (POP QUIZZ)

Brown Bag : MINI GAME 1 (POP QUIZZ)

Professional Development

10 Qs

MITRE ATT&CK Quiz

MITRE ATT&CK Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Log Lady

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a tactic in the MITRE ATT&CK framework?

Software Development

Defense Evasion

Data Corruption

Incident Reporting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a technique under the "Initial Access" tactic?

Privilege Escalation

Spearphishing Link

Command-Line Interface

Input Capture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which tactic would you find the technique "Credential Dumping"?

Credential Access

Lateral Movement

Execution

Persistence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of the "Persistence" tactic in MITRE ATT&CK?

To escalate privileges on a system

To establish and maintain unauthorized access

To execute malicious code

To exfiltrate data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique belongs to the "Execution" tactic?

Process Injection

Account Manipulation

Web Service Exfiltration

Credential Dumping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the "Exfiltration" tactic?

To hide malicious activity

To steal data from a target system

To escalate privileges

To move laterally within a network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is used for "Lateral Movement"?

Pass the Hash

Phishing

Browser Extensions

Data Encoding

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?