A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Year 8 IT - Network Communication

Year 8 IT - Network Communication

7th - 9th Grade

20 Qs

Programming Vocabulary

Programming Vocabulary

10th - 12th Grade

17 Qs

Technology in medicine

Technology in medicine

10th Grade

15 Qs

CMD - Windows

CMD - Windows

12th Grade

17 Qs

Fashion Merchandising 1.01

Fashion Merchandising 1.01

9th - 12th Grade

10 Qs

G9 QUIZ 1 2ND QUARTER

G9 QUIZ 1 2ND QUARTER

9th Grade

15 Qs

Virtual Memory

Virtual Memory

11th Grade

10 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

Assessment

Quiz

Computers

7th - 12th Grade

Easy

Created by

Ashley Smith

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Types of Social Engineering Attacks include: (Select all that are true)

Tailgating

Shoulder Surfing

Dumpster Diving

Alligator Wrestling

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Spoofing is...

An attack that exploits previously unknown vulnerability in an application or OS

A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.

An attack that shuts down the system.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Media Image

The type of security threat that uses computers or other networks to accept and pass on viruses is called _________________.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Jackson just downloaded a game onto his moms phone. But when she is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. This is an example of what?

A Roman Rummy

A Minecraft Mystery

A Trojan Horse

A Solitaire Spoof

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An example of a Mantrap would be...

A Taco

Turnstile

A Pizza

Alarms

Answer explanation

Two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A CEO of a company received an email from a bank indicating that it was imperative that the CEO respond to the email by clicking on a link. This link then downloaded malware on to their computer. What is this an example of?

Worm

Spyware

Backdoor

Whaling attack

Answer explanation

Media Image

Whaling is a common cyber attack that occurs when an attacker utilizes spear phishing methods to go after a large, high-profile target.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An industry standard that sets rules to protect credit card payment processes?

SOX

PCI-DSS

HIPPA

HIPPO

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?