Cyber Threats Advanced Quiz 1
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quiz 1
1. What is an "Advanced Persistent Threat" (APT)?
A virus that makes your screen flash for one hour
A prolonged, targeted attack to steal data or spy
A battery that lasts ten years without charging
2. What is "DNS Tunneling"?
Encapsulating traffic in DNS queries to bypass firewalls
Digging a physical hole to hide a server from people
A method to make a website load ten times faster
3. What is a "Watering Hole" attack?
Submerging a computer in water to see if it works
An animal that lives in a forest near a small lake
Infecting a site visited by a specific group of targets
4. What is "Polymorphic Malware"?
Malware that only works on ten computers at once
Malware that changes features constantly to evade detection
A computer game where you shape-shift into a bird
5. What is "Supply Chain Attack"?
Targeting a vendor to gain access to a larger organization
Breaking a metal chain used to secure a group of boxes
A way to name a file so it is easy to find on the web
6. What is "Data Ransom" Exfiltration (Double Extortion)?
Paying a person twice for the same computer job
Cleaning a hard drive using specialized digital soap
Encrypting data and threatening leaks unless paid
7. What is "Fast Flux" DNS?
An engine used to power a very fast car on a highway
Rapidly changing IP addresses to hide a botnet location
A way to make a computer program run faster than normal
8. What is "Process Hollowing"?
Replacing legitimate process code with malicious code in RAM
Removing the middle of a physical server to reduce weight
A game where you dig a hole in a digital garden
9. What is "Spear-Phishing" (Internal)?
A fish found in a small pool inside an office room
A way to name a computer so it is very easy to find
Using a compromised internal account to target employees
10. What is "Time-of-Check Time-of-Use" (TOCTOU)?
Measuring how long a person takes to eat a work meal
A race condition where system state changes before action
A clock used to tell time in ten different countries
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network