0% found this document useful (0 votes)
47 views4 pages

Practice Quiz For Learning MITRE ATT&CK Matrix For Enterprise

The document presents a practice quiz designed to test knowledge of the MITRE ATT&CK® Matrix for Enterprise, covering various tactics such as Initial Access, Execution, and Privilege Escalation. Each question focuses on specific techniques and goals associated with these tactics. The quiz is intended for learning purposes and is not graded.

Uploaded by

Naman Chadha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views4 pages

Practice Quiz For Learning MITRE ATT&CK Matrix For Enterprise

The document presents a practice quiz designed to test knowledge of the MITRE ATT&CK® Matrix for Enterprise, covering various tactics such as Initial Access, Execution, and Privilege Escalation. Each question focuses on specific techniques and goals associated with these tactics. The quiz is intended for learning purposes and is not graded.

Uploaded by

Naman Chadha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MITRE ATT&CK® Matrix for Enterprise

Reference Link: https://attack.mitre.org/matrices/enterprise/#

Practice Quiz for Learning MITRE ATT&CK® Matrix for Enterprise (Not Graded)
1. Which tactic in the MITRE ATT&CK® Matrix focuses on gaining an initial foothold in a
target system?
A. Execution
B. Initial Access
C. Persistence
D. Privilege Escalation

Answer:

2. Which technique is used to maintain access to a system after a reboot?


A. Credential Dumping
B. Scheduled Task/Job
C. Exploitation for Privilege Escalation
D. Command and Scripting Interpreter

Answer:

3. What is a common indicator of lateral movement using SMB/Windows Admin Shares?


A. Unusual file transfers between systems
B. High CPU usage on a single system
C. Frequent logon failures
D. Changes to DNS configurations

Answer:

4. Which technique in the MITRE ATT&CK® Matrix involves using a compromised account to
access resources?
A. Valid Accounts
B. Brute Force
C. Exploitation for Credential Access
D. Account Manipulation

Answer:
5. What is the primary goal of the 'Execution' tactic in the MITRE ATT&CK® Matrix?
A. To execute malicious code on a target system
B. To discover system information
C. To exfiltrate data
D. To escalate privileges

Answer:

6. Which technique involves modifying system processes to evade detection?


A. Process Injection
B. Masquerading
C. Obfuscated Files or Information
D. Exploitation for Defense Evasion

Answer:

7. What is the purpose of the 'Persistence' tactic in the MITRE ATT&CK® Matrix?
A. To maintain access to a system across reboots and interruptions
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To discover system vulnerabilities

Answer:

8. What is the primary goal of the 'Privilege Escalation' tactic in the MITRE ATT&CK® Matrix?
A. To gain higher-level permissions on a system
B. To exfiltrate sensitive data
C. To discover system vulnerabilities
D. To maintain access to a system across reboots

Answer:

9. What is the focus of the 'Defense Evasion' tactic in the MITRE ATT&CK® Matrix?
A. To avoid detection by security tools and analysts
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To discover system vulnerabilities

Answer:
10. What is the objective of the 'Credential Access' tactic in the MITRE ATT&CK® Matrix?
A. To obtain sensitive credentials like usernames and passwords
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To maintain access to a system across reboots

Answer:

11. What is the purpose of the 'Discovery' tactic in the MITRE ATT&CK® Matrix?
A. To gather information about the system and network
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To maintain access to a system across reboots

Answer:

12. What is the goal of the 'Execution' tactic in the MITRE ATT&CK® Matrix?
A. To run malicious code on a system
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To avoid detection by security tools

Answer:

13. Which tactic in the MITRE ATT&CK® Matrix focuses on gaining higher-level permissions on
a system?
A. Privilege Escalation
B. Persistence
C. Defense Evasion
D. Credential Access

Answer:

14. Which tactic in the MITRE ATT&CK® Matrix focuses on techniques used to steal sensitive
information like passwords or encryption keys?
A. Credential Access
B. Discovery
C. Collection
D. Exfiltration

Answer:
15. Which tactic in the MITRE ATT&CK® Matrix focuses on understanding the environment and
identifying potential targets?
A. Discovery
B. Execution
C. Collection
D. Credential Access

Answer:

You might also like