
Cybersecurity chapter 10
Quiz
•
Instructional Technology
•
8th - 12th Grade
•
Practice Problem
•
Medium
Vigiland Dhaiti
Used 21+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best countermeasure against social engineering?
User awareness training
Access auditing
Strong passwords
Acceptable use policy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common form of social engineering attack?
Distributing false information about your organization's financial status.
Hoax virus information emails.
Using a sniffer to capture network traffic.
Stealing the key card of an employee and using that to enter a secured building.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark received an email from a software company claiming his account will be disabled soon. The emailcontains several spelling errors, an attachment, and states he should open the attachment for further instructions.What should Mark do?
Delete the email without opening the attachment.
Reply to the sender and ask if the attachment is safe
Open the attachment because he has anti-virus software installed.
Forward the email to a friend and ask for advice.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a Man-in-the-Middle attack?
A person over the phone convinces an employee to reveal their logon credentials
An attacker intercepts communications between two network hosts by impersonating each host
Malicious code is planted on a system where it waits for a triggering event before activating
An IP packet is constructed which is larger than the valid size.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Data redundancy
Denial-of-service
Wiretapping
Power outage
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security measures is a form of biometrics?
BIOS password
Chassis intrusion detection
Fingerprint scanner
TPM
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do biometrics use to perform authentication of identity?
Knowledge of passwords
Biological attributes
Ability to perform tasks
Possession of a device
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
PAS TI
Quiz
•
12th Grade
20 questions
Como Funciona um Computador
Quiz
•
9th Grade
20 questions
Race Against Time
Quiz
•
7th - 11th Grade
20 questions
M104 - Programmation Web Statique (Q2)
Quiz
•
1st - 12th Grade
20 questions
Sistemas hidráulicos 2024
Quiz
•
8th Grade
20 questions
Impacto Ambiental y Tecnología
Quiz
•
10th Grade
21 questions
CPA MS-Office Hotkeys Quiz
Quiz
•
8th Grade - Professio...
20 questions
Soal UTS Ganjil
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
