Search Header Logo

Ch. 10.2 - 10.4

Authored by Amy Merchant

Computers

9th - 12th Grade

Ch. 10.2 - 10.4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best countermeasure against social engineering?

User awareness training

Acceptable use policy

Access auditing

Strong passwords

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a common form of social engineering attack?

Stealing the key card of an employee and using that to enter a secured building.

Distributing false information about your organization's financial status.

Hoax virus information emails.

Using a sniffer to capture network traffic.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

Open the attachment because he has anti-virus software installed.

Forward the email to a friend and ask for advice.

Reply to the sender and ask if the attachment is safe.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following describes a Man-in-the-Middle attack?

A person over the phone convinces an employee to reveal their logon credentials.

An IP packet is constructed which is larger than the valid size.

Malicious code is planted on a system where it waits for a triggering event before activating.

An attacker intercepts communications between two network hosts by impersonating each host.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Data redundancy

Power outage

Wiretapping

Denial-of-service

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.

Which of the following does this security threat describe?

Spoofing

Zombie/botnet

Man-in-the-middle

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.

As a first responder, which of the following is the next BEST step to perform?

Investigate how the attack occurred.

Hire a forensic team to gather evidence.

Prevent such an incident from occurring again.

Contain the problem.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?