CISO Life • Analyst Training

Top 50 Cybersecurity Threats – Analyst Test

Answer all 50 questions. When you submit, your score and per-question feedback will appear below. This test is designed for junior analysts to validate baseline threat knowledge.

Analyst Information
Optional but recommended
Test Questions (50)
Select one answer per question
1. Account Takeover
What makes account takeover so difficult to detect?
2. Advanced Persistent Threat (APT)
What defines an APT?
3. AWS Attacks
According to AWS’s shared responsibility model, who secures data inside an S3 bucket?
4. Application Access Token Abuse
Why are stolen OAuth tokens dangerous?
5. Bill Fraud
Why do victims often fall for fraudulent bills?
6. Brute Force Attack
What is a dictionary attack?
7. Business Email Compromise (BEC)
How has BEC evolved in recent years?
8. Cloud Cryptomining
What is a common sign of cryptomining in cloud environments?
9. Command and Control (C2)
What does a C2 server enable attackers to do?
10. Compromised Credentials
Why do credential harvesting attacks succeed so often?
11. Credential Dumping
Tools like Mimikatz allow attackers to:
12. Credential Reuse Attack
What is the core concept behind a credential reuse attack?
13. Cross-Site Scripting (XSS)
What can XSS attacks steal?
14. Cryptojacking Attack
Cryptojacking malware typically:
15. DNS Amplification
Why is DNS amplification effective?
16. DNS Hijacking
DNS hijacking allows attackers to:
17. DNS Tunneling
DNS tunneling is dangerous because:
18. DoS / DDoS Attack
DDoS attacks are difficult to mitigate because:
19. Drive-by Download
Why can drive-by infections occur without user clicks?
20. Insider Threat
Why are insiders particularly dangerous?
21. IoT Threats
What makes IoT devices high risk?
22. Macro Viruses
How do macro viruses typically spread?
23. Malicious PowerShell
Why do attackers favor PowerShell?
24. Malware
What makes Emotet so destructive?
25. Man-in-the-Middle (MITM)
What technique is used in many MITM attacks?
26. Masquerade Attack
In a masquerade attack, the attacker:
27. Meltdown & Spectre
Why are CPU vulnerabilities so impactful?
28. Network Sniffing
Sniffing attacks expose data when:
29. Open Redirection
Open redirects allow attackers to:
30. Pass-the-Hash
Why is pass-the-hash effective?
31. Phishing
Why does phishing still work?
32. Phishing Payloads
Phishing payloads often include:
33. Spear Phishing
What makes spear phishing different?
34. Whaling
Whaling attacks focus on:
35. Privileged User Compromise
Why are privileged accounts dangerous if compromised?
36. Ransomware
Modern ransomware “double extortion” means:
37. Router & Infrastructure Attacks
Why target routers?
38. Shadow IT
Shadow IT increases risk because:
39. Simjacking
SIM swap attacks allow criminals to:
40. Social Engineering
Why is social engineering effective?
41. Spyware
What can spyware collect?
42. SQL Injection
SQL injection allows attackers to:
43. Supply Chain Attack
Why are supply chain attacks dangerous?
44. Suspicious Cloud Storage Activity
What may indicate cloud storage compromise?
45. Typosquatting
Typosquatting relies on:
46. Watering Hole Attack
Watering hole attacks compromise:
47. Web Session Cookie Theft
Stolen session cookies allow attackers to:
48. Zero-Day Exploit
Zero-days are dangerous because:
49. Cryptomining – Cloud Variant
A sudden spike in cloud compute usage may indicate:
50. Application Token Abuse (Refresh Tokens)
Why are refresh tokens risky when stolen?
Results:
0%