Cyber Threats Advanced Quiz 3
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quiz 3
1. What is "DGA" (Domain Generation Algorithm)?
Naming a computer so it is easy to find on the web
Malware periodically generating new domain names
A computer game about building a very large city
2. What is "Session Fixation"?
Forcing a user's session ID to a value known by an attacker
Fixing a slow computer by using a physical screwdriver
A game about fixing a broken car in under one hour
3. What is "Man-in-the-Browser" (MitB) attack?
A person standing inside a screen to watch a user
Naming a computer so it is easy to find on the web
A Trojan intercepting web traffic from within the browser
4. What is "Exploit Kit"?
A small box containing tools to fix a computer
Software designed to identify and exploit vulnerabilities
A type of computer game about finding hidden treasure
5. What is "Beaconing" interval randomization?
Varying malware communication times to evade detection
Changing server light colors every ten minutes to save power
Making a computer program run faster than normal speed
6. What is "Sandbox Evasion"?
Jumping out of a physical sandbox on a playground
Naming a file so no one is able to find it on the web
Malware detecting and bypassing virtual test environments
7. What is "Kerberos Delegation"?
Hiring a person to help write a letter to another city
Allowing a service to impersonate a user for resource access
A computer game about finding a hidden blue box
8. What is "BloodHound" tool used for?
Mapping attack paths in Active Directory setups
A dog trained to find people lost in a forest
Naming a computer so it is easy to find on the web
9. What is "Credential Siphoning"?
Using a specialized straw to drink a glass of water
A computer game about collecting as many coins as possible
Stealthy extraction of login data to avoid triggering alarms
10. What is "Sliver" or "Cobalt Strike"?
Metal used to make a case for an expensive laptop
C2 frameworks used for advanced penetration tests
Naming a computer so it is easy to find on the web
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network