Cyberattack Methods 1

Cyberattack Methods 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

MTSS Teams Fast & Curious

MTSS Teams Fast & Curious

Professional Development

15 Qs

21. Threat Vectors Quiz

21. Threat Vectors Quiz

Professional Development

16 Qs

Cyber Safe

Cyber Safe

Professional Development

10 Qs

Cyberattack Methods 2

Cyberattack Methods 2

Professional Development

15 Qs

" IT SECURITY & CYBER CRIMES"

" IT SECURITY & CYBER CRIMES"

Professional Development

10 Qs

Learning Value Academy Program March Session

Learning Value Academy Program March Session

Professional Development

10 Qs

Productivity Systems

Productivity Systems

Professional Development

11 Qs

Online Safety

Online Safety

Professional Development

10 Qs

Cyberattack Methods 1

Cyberattack Methods 1

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Elankayer Sithirasenan

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between an attack surface and an attack vector?

Attack vector is hardware, attack surface is software

Attack surface includes all potential entry points; vector is the specific method used

Attack vector includes employees, attack surface includes only systems

They are interchangeable terms

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a passive attack?

Modifying system configurations

Encrypting files with ransomware

Monitoring data traffic without altering it

Deleting user data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyberattack method exploits the psychological manipulation of users?

Brute-force attack

Zero-day exploit

Social engineering

Denial-of-service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a common social engineering tactic?

Port scanning

Baiting

Packet sniffing

Firewall bypassing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of phishing targets high-level executives?

Smishing

Whaling

Vishing

Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a zero-trust model, what is assumed about internal users and systems?

They are always trusted

Only administrators are verified

No one is trusted by default

Internal systems are secure by default

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a brute-force attack aim to do?

Crack passwords by trying many combinations

Infect systems with malware

Intercept unencrypted emails

Monitor employee communication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?