Understanding Threat Vectors

Understanding Threat Vectors

Assessment

Interactive Video

Computers, Business

10th - 12th Grade

Hard

Created by

Aiden Montgomery

FREE Resource

The video discusses various threat vectors used by attackers to gain access to systems. It covers messaging systems, images, files, mobile and call systems, USB devices, software vulnerabilities, and supply chain risks. The importance of keeping software updated and securing networks is emphasized, along with the dangers of default credentials and counterfeit hardware.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a threat vector?

A method used by attackers to gain access to systems

A type of firewall

A software update

A secure network protocol

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are messaging systems a popular target for attackers?

They are rarely used

They are easy to secure

They do not support encryption

They are widely used for communication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can attackers use SVG files as a threat vector?

By sending them as email attachments

By embedding malicious code within the XML

By compressing them into zip files

By using them in social media posts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file format is commonly used to hide malicious software?

PDF

MP3

TXT

JPEG

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method attackers use to exploit USB drives?

Using them as storage devices

Embedding malware to execute upon connection

Encrypting the data on the drive

Using them to charge devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to keep software updated?

To patch security vulnerabilities

To add new features

To improve user interface

To increase file size

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of using default credentials on devices?

They can be easily guessed by attackers

They are not compatible with all devices

They are difficult to remember

They require frequent updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?