Cyber Threats Intermediate Quiz 4
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quiz 4
1. What is "Beaconing" in malware?
Infected systems periodically communicating with a command server
Using a very bright light to find a server that is hidden in a dark room
A way to name a computer so that it is very easy to find on the web
2. What is "Lateral Movement"?
Moving a computer desk from the left side of a room to the right side
A type of exercise where you walk sideways while holding a laptop
Techniques used by attackers to move deeper into a target network
3. What is "Privilege Escalation"?
A way to make a computer program run faster than its normal speed
Gaining a higher level of access than what was originally intended
Hiring a person to help you write more complex code for a website
4. What is "Exfiltration"?
The unauthorized transfer of data from a computer or other device
Using a specialized type of filter to clean the water inside a server
A way to name a file so that no one is able to find it on the web
5. What is "Data Masking"?
Wearing a physical mask while you are using a computer in an office
Putting a piece of tape over a file name so that no one can see it
Creating a version of data that is structurally similar but unidentifiable
6. What is "SYN Flood" attack?
Filling a server room with soap until the computers stop working today
An attack that sends many SYN requests to a system to exhaust resources
A way to make a website run ten times faster than its normal speed
7. What is "Wiping"?
Using specialized software to permanently delete data from a drive
Using a dry cloth to remove dust from a computer monitor screen
A way to name a file so that no one is able to find it on the web
8. What is "Rainbow Table" attack?
A type of table that is painted with every color of the rainbow today
Using a computer to draw a picture of a rainbow on the screen unit
A precomputed table for reversing cryptographic hash functions (passwords)
9. What is "Salting" in hashing?
Putting actual salt on a computer motherboard to make it run faster
Adding random data to a password before hashing to prevent table attacks
A type of food that is served during a holiday dinner at a tech office
10. What is "Pass-the-Hash"?
Capturing a password hash and using it to authenticate without a password
Giving a piece of paper with a password on it to a person sitting near you
A type of game where you have to throw a digital box to another player
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network