CYB3R53C

Cybersecurity Starts Here: Explore, Learn, and Secure Your Operations

Quiz – Common Security Threats

 

Results

#1. Which of the following is NOT a motivation of malicious actors?

#2. Which of the following is NOT considered a type of DDoS attack?

#3. Why is UDP the “protocol of choice” for reflected DDoS attack?

#4. Which of the following is leveraged in social engineering?

#5. Which of the following is NOT a form of social engineering

#6. Which of the following is NOT a valid defense against social engineering?

#7. Which tool provides the most granular information to help in the identification of malware?

#8. NetFlow provides which of the following?

#9. Which of the following is NOT used for identification of malware on the network?

#10. Which type of data is not often attractive to malicious actors?

Previous
Finish