MITRE ATT&CK® Matrix for Enterprise
Reference Link: https://attack.mitre.org/matrices/enterprise/#
Practice Quiz for Learning MITRE ATT&CK® Matrix for Enterprise (Not Graded)
1. Which tactic in the MITRE ATT&CK® Matrix focuses on gaining an initial foothold in a
target system?
A. Execution
B. Initial Access
C. Persistence
D. Privilege Escalation
Answer:
2. Which technique is used to maintain access to a system after a reboot?
A. Credential Dumping
B. Scheduled Task/Job
C. Exploitation for Privilege Escalation
D. Command and Scripting Interpreter
Answer:
3. What is a common indicator of lateral movement using SMB/Windows Admin Shares?
A. Unusual file transfers between systems
B. High CPU usage on a single system
C. Frequent logon failures
D. Changes to DNS configurations
Answer:
4. Which technique in the MITRE ATT&CK® Matrix involves using a compromised account to
access resources?
A. Valid Accounts
B. Brute Force
C. Exploitation for Credential Access
D. Account Manipulation
Answer:
5. What is the primary goal of the 'Execution' tactic in the MITRE ATT&CK® Matrix?
A. To execute malicious code on a target system
B. To discover system information
C. To exfiltrate data
D. To escalate privileges
Answer:
6. Which technique involves modifying system processes to evade detection?
A. Process Injection
B. Masquerading
C. Obfuscated Files or Information
D. Exploitation for Defense Evasion
Answer:
7. What is the purpose of the 'Persistence' tactic in the MITRE ATT&CK® Matrix?
A. To maintain access to a system across reboots and interruptions
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To discover system vulnerabilities
Answer:
8. What is the primary goal of the 'Privilege Escalation' tactic in the MITRE ATT&CK® Matrix?
A. To gain higher-level permissions on a system
B. To exfiltrate sensitive data
C. To discover system vulnerabilities
D. To maintain access to a system across reboots
Answer:
9. What is the focus of the 'Defense Evasion' tactic in the MITRE ATT&CK® Matrix?
A. To avoid detection by security tools and analysts
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To discover system vulnerabilities
Answer:
10. What is the objective of the 'Credential Access' tactic in the MITRE ATT&CK® Matrix?
A. To obtain sensitive credentials like usernames and passwords
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To maintain access to a system across reboots
Answer:
11. What is the purpose of the 'Discovery' tactic in the MITRE ATT&CK® Matrix?
A. To gather information about the system and network
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To maintain access to a system across reboots
Answer:
12. What is the goal of the 'Execution' tactic in the MITRE ATT&CK® Matrix?
A. To run malicious code on a system
B. To escalate privileges on a compromised system
C. To exfiltrate sensitive data
D. To avoid detection by security tools
Answer:
13. Which tactic in the MITRE ATT&CK® Matrix focuses on gaining higher-level permissions on
a system?
A. Privilege Escalation
B. Persistence
C. Defense Evasion
D. Credential Access
Answer:
14. Which tactic in the MITRE ATT&CK® Matrix focuses on techniques used to steal sensitive
information like passwords or encryption keys?
A. Credential Access
B. Discovery
C. Collection
D. Exfiltration
Answer:
15. Which tactic in the MITRE ATT&CK® Matrix focuses on understanding the environment and
identifying potential targets?
A. Discovery
B. Execution
C. Collection
D. Credential Access
Answer: