Cybersecurity chapter 10

Cybersecurity chapter 10

8th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

VB.NET + SQL

VB.NET + SQL

12th Grade

20 Qs

Cuestionario 01 Cuarto Perito

Cuestionario 01 Cuarto Perito

11th Grade

20 Qs

Barcode

Barcode

1st - 10th Grade

20 Qs

Proxy

Proxy

10th Grade

20 Qs

Ôn tập Công nghệ 8 cuối kì II KNTT

Ôn tập Công nghệ 8 cuối kì II KNTT

8th Grade

20 Qs

Relés Bilingüe

Relés Bilingüe

9th Grade

20 Qs

LECCIÓN IP IQ - 2019 -2020: 8VO EGB "B"

LECCIÓN IP IQ - 2019 -2020: 8VO EGB "B"

8th Grade

20 Qs

Understanding Copyright

Understanding Copyright

7th - 9th Grade

20 Qs

Cybersecurity chapter 10

Cybersecurity chapter 10

Assessment

Quiz

Instructional Technology

8th - 12th Grade

Practice Problem

Medium

Created by

Vigiland Dhaiti

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best countermeasure against social engineering?

User awareness training

Access auditing

Strong passwords

Acceptable use policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of social engineering attack?

Distributing false information about your organization's financial status.

Hoax virus information emails.

Using a sniffer to capture network traffic.

Stealing the key card of an employee and using that to enter a secured building.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark received an email from a software company claiming his account will be disabled soon. The emailcontains several spelling errors, an attachment, and states he should open the attachment for further instructions.What should Mark do?

Delete the email without opening the attachment.

Reply to the sender and ask if the attachment is safe

Open the attachment because he has anti-virus software installed.

Forward the email to a friend and ask for advice.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Man-in-the-Middle attack?

A person over the phone convinces an employee to reveal their logon credentials

An attacker intercepts communications between two network hosts by impersonating each host

Malicious code is planted on a system where it waits for a triggering event before activating

An IP packet is constructed which is larger than the valid size.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Data redundancy

Denial-of-service

Wiretapping

Power outage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures is a form of biometrics?

BIOS password

Chassis intrusion detection

Fingerprint scanner

TPM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do biometrics use to perform authentication of identity?

Knowledge of passwords

Biological attributes

Ability to perform tasks

Possession of a device

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?