Quiz Summary
0 of 14 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 14 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 14
1. Question
A user’s workstation displays a message stating all files are encrypted and demands anonymous payment for recovery. What type of malware is this?
CorrectIncorrect -
Question 2 of 14
2. Question
True or False: Modern antivirus products only detect viruses and Trojans.
CorrectIncorrect -
Question 3 of 14
3. Question
Which statement best describes the difference between a Trojan and a backdoor?
CorrectIncorrect -
Question 4 of 14
4. Question
A webmail account was compromised, and an investigation finds an unknown USB extension device attached to the workstation. What is the likely attack vector?
CorrectIncorrect -
Question 5 of 14
5. Question
A process named
n0tepad.exeis consuming 80–90% CPU and performing constant small disk reads/writes. What type of malware might you suspect?CorrectIncorrect -
Question 6 of 14
6. Question
Which framework catalogs adversary TTPs (tactics, techniques, and procedures)?
CorrectIncorrect -
Question 7 of 14
7. Question
What is an amplification attack?
CorrectIncorrect -
Question 8 of 14
8. Question
True or False: Most DoS attacks are distributed because many hosts are needed to overwhelm the target.
CorrectIncorrect -
Question 9 of 14
9. Question
Users report slow websites and excessive ads. All systems are using an unauthorized DNS resolver. What is the likely cause?
CorrectIncorrect -
Question 10 of 14
10. Question
Multiple failed attempts to read
NTDS.DITfrom a domain controller were logged. This is likely a precursor to what type of attack?CorrectIncorrect -
Question 11 of 14
11. Question
How does a replay attack work in session hijacking?
CorrectIncorrect -
Question 12 of 14
12. Question
You see repeated web requests containing
%3Cand%3E. Should this be investigated?CorrectIncorrect -
Question 13 of 14
13. Question
You add authentication between a web server and a back-end database. This helps prevent which type of attack?
CorrectIncorrect -
Question 14 of 14
14. Question
A log shows a high volume of HTTP 403 Forbidden errors. Which device is likely generating these logs?
CorrectIncorrect