Request Demo

1Watch this

Learning cyber terms, concepts, and practices should never stop. To keep fundamental cyber knowledge sharp, watch the video, THEN test your learning with a quiz. Listen carefully in the video to select the correct answers according to the narrative. You’ll receive a score to share on social media to encourage your professional network to keep learning cyber security anytime, anywhere

2Take this Quiz

Q1 - What element do watering hole attacks leverage to gain target enterprises and government agencies?

  1. cloud services
  2. endpoint devices
  3. email account

Q2 - What is unique about a watering hole attack?

  1. It is hyper-targeted to a select number of individuals in an organization.
  2. It attracts certain individuals to a specific website.
  3. External Intentional
  4. Internal Intentional
  5. It casts a wide net to take advantage of people likely to visit certain websites.

Q3 - How many steps are in a watering hole attack?

  1. 6
  2. 4
  3. 5
  4. 7

Q4 - Which is these options is a method to guard against a watering hole attack?

  1. Ask your colleagues to visit a legitimate website link first to ensure it can be accessed safely.
  2. Keeping system vulnerability patching current
  3. Avoid visiting third-party websites altogether
  4. Clearing your browsing web history

Q5 - Why are watering hole attacks so effective?

  1. Because they compromise a legitimate third-party website, which is often difficult to blacklist
  2. Because they cast a narrow net of targeted individuals based on their browsing history.
  3. Because they target internal company websites where employees are browsing often.
0
Cyber Noob