Search Header Logo
General attack strategy

General attack strategy

Assessment

Interactive Video

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Dorothy Hill

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in a general attack strategy?

Staging

Escalating privileges

Reconnaissance

Exploiting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is commonly used by attackers to find open ports on a system?

Ping sweep

Dumpster diving

Nmap utility

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Are you enjoying the video lesson?

Yes

No

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What might an attacker use to gain access through a technical exploit?

Sympathetic approach

Buffer overflow

Dumpster diving

Aggressive emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a backdoor in the context of a cyber attack?

A way to gain initial access

A method to escalate privileges

An easy way to access the system again

A tool for reconnaissance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the final step in a general attack strategy?

Reconnaissance

Breaching

Exploiting

Staging

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?