Search Header Logo

Understanding Advanced Persistent Threats - GROUP 5

Authored by Mark Feguro

Information Technology (IT)

University

Used 8+ times

Understanding Advanced Persistent Threats - GROUP 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an Advanced Persistent Threat (APT) in cybersecurity?

A short-term, easily detected cyberattack.

A sustained attack where a threat actor infiltrates a network and attempts to remain undetected.

A random act of cyber vandalism.

A type of phishing scam targeting individuals.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who often orchestrates APT invasions to achieve strategic, long-term goals?

Individual, unsophisticated hackers.

Well-funded actors, such as organized cybercriminals or hacktivist groups.

Amateur gaming communities.

Everyday internet users.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How do hackers often gain initial access in an APT attack?

By guessing common passwords.

By physically breaking into a data center.

By exploiting attack vectors like unpatched vulnerabilities.

By sending out generic spam emails.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main goal of an APT attack once inside the network?

To immediately corrupt all data.

To establish persistence, sometimes by deploying a backdoor to maintain long-term access.

To alert the target organization to their presence.

To perform a denial-of-service attack.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the real danger of APTs?

Their loud and obvious nature.

Their lack of focus.

Their persistence and precision.

Their dependence on easily detectable tools.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Unlike traditional cyberattacks, what do APTs focus on?

Random targets to maximize chaos.

Highly specific organizations or industries, targeting strategic individuals to gain access to high-value systems and data.

Any available computer on the internet.

Publicly accessible websites.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do malicious actors do once inside a network during an APT attack?

They immediately reveal themselves.

They move laterally across the network to access more information, carefully evading detection tools.

They only target a single computer.

They demand ransom immediately.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?