Watering Hole Attacks

Watering Hole Attacks

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of a watering hole attack?

It involves directly attacking a target's internal network.

It focuses on gaining physical access to a target's premises.

It compromises a third-party website frequently visited by the target group.

It relies on sending mass phishing emails to all employees.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a crucial step for an attacker when executing a watering hole attack?

Distributing infected USB drives in the victim's parking lot.

Determining which third-party websites the victim group frequently uses.

Sending spear-phishing emails to high-value targets.

Brute-forcing administrator passwords on the target's main server.

3.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Are you enjoying the video lesson?

Yes

No

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the January 2017 watering hole attack, how did the attackers ensure that only specific financial institutions received the malicious code?

They sent the malicious code via encrypted email attachments.

They used IP address matching to deliver malicious JavaScript files.

They physically installed the malware on the financial institutions' servers.

They exploited a zero-day vulnerability in the institutions' firewalls.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the recommended security strategy to defend against watering hole attacks?

Implementing a single, powerful firewall.

Relying solely on up-to-date antivirus software.

Employing a layered defense approach, also known as defense-in-depth.

Strictly enforcing a "no external USB devices" policy.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures can help stop malicious network traffic from a watering hole attack before it causes significant damage?

Physical security guards at the office entrance.

Regular employee social engineering training.

Firewalls and Intrusion Prevention Systems (IPS).

Using only open-source software.