Search Header Logo

Cyberattack Methods 1

Authored by Elankayer Sithirasenan

Professional Development

Professional Development

Used 1+ times

Cyberattack Methods 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between an attack surface and an attack vector?

Attack vector is hardware, attack surface is software

Attack surface includes all potential entry points; vector is the specific method used

Attack vector includes employees, attack surface includes only systems

They are interchangeable terms

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a passive attack?

Modifying system configurations

Encrypting files with ransomware

Monitoring data traffic without altering it

Deleting user data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyberattack method exploits the psychological manipulation of users?

Brute-force attack

Zero-day exploit

Social engineering

Denial-of-service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a common social engineering tactic?

Port scanning

Baiting

Packet sniffing

Firewall bypassing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of phishing targets high-level executives?

Smishing

Whaling

Vishing

Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a zero-trust model, what is assumed about internal users and systems?

They are always trusted

Only administrators are verified

No one is trusted by default

Internal systems are secure by default

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a brute-force attack aim to do?

Crack passwords by trying many combinations

Infect systems with malware

Intercept unencrypted emails

Monitor employee communication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development