Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Which of the following would be assessed by likelihood and impact?
CorrectIncorrect -
Question 2 of 10
2. Question
Which type of threat actor is primarily motivated by the desire for political change?
CorrectIncorrect -
Question 3 of 10
3. Question
Which three types of threat actor are most likely to have high levels of funding?
CorrectIncorrect -
Question 4 of 10
4. Question
Nation-state actors only pose a risk to other states.
CorrectIncorrect -
Question 5 of 10
5. Question
A company uses stock photos from a “copyright-free” media site. Later, a computer is infected with malware embedded in the image file headers. Which threat vector(s) apply?
CorrectIncorrect -
Question 6 of 10
6. Question
A company’s systems are disrupted by ransomware exploiting a flaw in a network monitoring tool provided by its outsourced IT management. Aside from a software vulnerability, what part of the attack surface was used?
CorrectIncorrect -
Question 7 of 10
7. Question
A company uses cell phones for IT support to remote workers but lacks an official directory of staff contact numbers. Which threat vector risk is increased?
CorrectIncorrect -
Question 8 of 10
8. Question
A caller to the help desk says they can’t connect to the e-commerce website and asks for a username and password. They give a valid company name but are not in the customer database and don’t know the correct company code or customer ID. What is this most likely?
CorrectIncorrect -
Question 9 of 10
9. Question
While browsing a vendor’s site, a window appears claiming thousands of files are infected and instructing the user to click a link to install software. What type of attack is this?
CorrectIncorrect -
Question 10 of 10
10. Question
The CEO calls asking for market research to be sent to their personal email without a proper request form. They say it’s urgent for a conference. You recognize their voice, but policy prohibits using third-party email. What could this be?
CorrectIncorrect