Practice Example 2: Equifax Data Breach (march-july 2017) (4.2) - Introduction and Basic Terminology
Students

Academic Programs

AI-powered learning for grades 8-12, aligned with major curricula

Professional

Professional Courses

Industry-relevant training in Business, Technology, and Design

Games

Interactive Games

Fun games to boost memory, math, typing, and English skills

Example 2: Equifax Data Breach (March-July 2017)

Practice - Example 2: Equifax Data Breach (March-July 2017)

Learning

Interactive Quizzes

Quick quizzes to reinforce your learning

Question 1

The attackers used what technique to bypass detection while exfiltrating data for a prolonged period?
* Type: mcq
* Options: DDoS attacks, Phishing campaigns, Encrypted tunnels, Logic bombs
* Correct Answer: Encrypted tunnels
* Explanation: The text states they used "encrypted tunnels to bypass detection."
* Hint: They hid their activity by scrambling the data in transit.


DDoS attacks
Phishing campaigns
Encrypted tunnels
Logic bombs * **Correct Answer**: Encrypted tunnels * **Explanation**: The text states they used "encrypted tunnels to bypass detection." * **Hint**: They hid their activity by scrambling the data in transit. ---

💡 Hint: They hid their activity by scrambling the data in transit. ---

Get performance evaluation