Back to Home Screen
More Info
Mission
Live Help
Our Team
CTF
Course 7 - Attacks Quiz
1. A persistent attack is one that:
Constantly attacks, they are highly advanced and successful
Incorrect.
Constantly attempts to attack, with little success
Incorrect.
Maintains a continuous connection once it has infiltrated a system
Correct! Persistence in security usually refers to maintaining a continuous connection.
Maintains a continuous attack pattern
Incorrect.
2. Interception is similar to:
Ransomware
Ransomware is unrelated.
Spyware
Correct! Interception and spyware/spying share many characteristics.
Seeware
This is not a thing.
Malware
Malware is an incredibly broad category and it would be incorrect to say that interception is similar to every form of malware. There is a closer option.
3. Man-in-the-browser is a network layer attack, while man-in-the-middle is an application layer attack.
True
See false for explanation.
False
Correct! Man-in-the-browser is actually an application layer attack, while man-in-the-middle is a network layer attack.
4. Spoofing can be used interchangeably with social engineering.
True
See false for explanation.
False
Spoofing refers to more technical impersonation (of devices, etc.), while social engineering is more social impersonation.
Submit Quiz
< Previous
Next >
Skip to Next Course
Go back?
Back to all Courses
Table of Contents
Course 7 - Introduction
Persistent Threats
Spoofing
Interception Attacks
More Attacks Quiz
Need Help?
Chat Box