Instructional Technology

Professional Development

Image

Importance of Logs

9
plays

15 questions

Show Answers
See Preview
  • 1. Multiple Choice
    30 seconds
    1 pt

    What is an adversary's attempt to map out its target(s)?

    Enumeration

    Exploitation

    Post exploitation

    Data exfiltration

  • 2. Multiple Choice
    30 seconds
    1 pt

    What is an initial intrusion into the target's systems?

    Enumeration

    Exploitation

    Post exploitation

    Data exfiltration

  • 3. Multiple Choice
    30 seconds
    1 pt

    What is it called, activities that serve to strengthen the attacker's position in the systems, such as installing a backdoor, or privilege escalation?

    Enumeration

    Exploitation

    Post exploitation

    Data exfiltration

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?