Cyber Threats Advanced Quiz 4
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quiz 4
1. What is "Memory Scraping"?
Scanning RAM to extract sensitive data like credit card numbers
Using a tool to clean dust off of a memory chip
Naming a file so that no one can find it on the web
2. What is "Blind SQL Injection"?
Using a computer while wearing a very thick mask
Naming a computer so it is easy to find on the web
A type of SQLi where the attacker infers data from system responses
3. What is "ASLR" (Address Space Layout Randomization)?
Organizing a house to find items quickly
A memory-protection process making target addresses harder to predict
A computer game about building a very large city
4. What is "Fuzzing"?
Providing random or invalid data to a program to find security bugs
A sweater made of very soft and fuzzy material
Making a computer program run faster than its normal speed
5. What is "Air-Gap Jumping"?
Jumping over a gap in the floor filled with cold air
A computer game about jumping over a blue box
Techniques used to bridge gaps and infect non-networked PCs
6. What is "DLL Hijacking"?
Stealing a computer used to manage a website's domain name
Exploiting how applications load DLLs to execute malicious code
Naming a computer so it is easy to find on the web
7. What is "Web Shell"?
A malicious script uploaded to a server for remote admin access
A beach shell that has a computer inside it
Naming a file so that no one can find it on the web
8. What is "Cryptojacking"?
A computer game about finding a hidden gold coin
Making a computer program run faster than its normal speed
Using another's computer power to mine crypto without permission
9. What is "Socks Proxy" in attacks?
A type of sock worn by people who are good at coding
A protocol used to tunnel traffic and hide attack origins
Naming a computer so it is easy to find on the web
10. What is "WMI Persistence"?
Windows Management Instrumentation to maintain stealthy access
A person who is very good at remembering names and dates
A computer game about building a very large city
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network