Cyber Threats Advanced Quiz 5
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quiz 5
1. What is "Kerberos Silver Ticket" Limitation?
A rule only allowing one silver ticket at a time
It only allows access to a specific service, not the domain
Candy shaped like a small computer motherboard
2. What is "Cross-Protocol Relay"?
Capturing authentication on one protocol and using it on another
A race where you run while holding a computer
Making a computer program run faster than normal
3. What is "In-Memory Execution"?
Remembering every name of every person met in the office
A computer game where you find a hidden blue box
Running malicious code in RAM to avoid creating disk files
4. What is "Domain Fronting"?
Standing in front of a famous computer person's house
Hiding true traffic destinations using a different domain name
Naming a computer so it is easy to find on the web
5. What is "DCSync" attack?
Impersonating a Domain Controller to request password data
Syncing two computers so they have the same time
A game where you dance along with a digital person
6. What is "Golden GMSA" attack?
A prize given for the best computer password
Candy shaped like a small computer motherboard
Exploiting Group Managed Service Accounts for domain access
7. What is "Shadow Credentials"?
A shadow cast by a computer monitor on a wall
Using public keys to gain Active Directory persistence
Naming a file so no one can find it on the web
8. What is "Egress Data Rate Limiting"?
Restricting data speed leaving a network to prevent theft
Making a computer program run faster than normal
A game where you run through a very crowded city
9. What is "NTLM Relay"?
A race where you throw a digital box to another person
Naming a computer so it is easy to find on the web
Intercepting NTLM authentication and forwarding it to a server
10. What is "Cobalt Strike" Malleable C2?
Clay used to build a model of a computer server
A feature allowing customization of network traffic profiles
Making a computer program run faster than normal
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network