Search Header Logo

CST07 - Cyber Kill Chain and Intro to Active Directory

Authored by Lee Smith

Computers

Professional Development

Used 3+ times

CST07 - Cyber Kill Chain and Intro to Active Directory
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the Cyber Kill Chain model?

To classify malware types based on severity

To define stages of a cyber attack for analysis and response

To identify vulnerabilities in hardware components

To rank threat actors by sophistication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Running a Nessus vulnerability scan

Sending phishing emails to employees

Searching LinkedIn for employee roles and skills

Attempting to brute-force login credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might an attacker use obfuscated PowerShell commands in a macro-enabled Excel file?

To improve performance of the script

To ensure compatibility with older systems

To evade detection by security tools

To simplify debugging and error handling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the Command and Control (C2) stage in the Cyber Kill Chain?

To deliver malware to the target system

To establish communication with compromised systems

To scan for vulnerabilities in external networks

To exfiltrate data from the target environment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes lateral movement in a cyber attack?

Gaining initial access through phishing

Moving from one compromised system to others within the network

Encrypting files on a single endpoint

Sending spam emails from a hijacked account

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is designed to improve upon NTLM by using ticket-based authentication?

LDAP

Kerberos

RADIUS

SAML

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Actions on Objectives stage of the Cyber Kill Chain typically involve?

Initial scanning of the network

Exploiting a vulnerability

Data exfiltration or ransomware deployment

Sending phishing emails

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?