Ch. 10.2 - 10.4

Ch. 10.2 - 10.4

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Bab III : Sistem Komputasi

Bab III : Sistem Komputasi

10th Grade

25 Qs

Evaluación final TeI Grado 11

Evaluación final TeI Grado 11

11th Grade

25 Qs

DFD - EVALUACION

DFD - EVALUACION

9th - 12th Grade

25 Qs

Historia y Generaciones 1 y 2 taller MT

Historia y Generaciones 1 y 2 taller MT

10th Grade

25 Qs

FIREWALL PADA JARINGAN (AIJ 12 TKJ)

FIREWALL PADA JARINGAN (AIJ 12 TKJ)

12th Grade

25 Qs

Đề thi số 4 (A2)

Đề thi số 4 (A2)

6th - 9th Grade

25 Qs

KUIZ BIJAK ICT

KUIZ BIJAK ICT

7th - 12th Grade

25 Qs

C Programming Quiz

C Programming Quiz

12th Grade

25 Qs

Ch. 10.2 - 10.4

Ch. 10.2 - 10.4

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Amy Merchant

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best countermeasure against social engineering?

User awareness training

Acceptable use policy

Access auditing

Strong passwords

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a common form of social engineering attack?

Stealing the key card of an employee and using that to enter a secured building.

Distributing false information about your organization's financial status.

Hoax virus information emails.

Using a sniffer to capture network traffic.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

Open the attachment because he has anti-virus software installed.

Forward the email to a friend and ask for advice.

Reply to the sender and ask if the attachment is safe.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following describes a Man-in-the-Middle attack?

A person over the phone convinces an employee to reveal their logon credentials.

An IP packet is constructed which is larger than the valid size.

Malicious code is planted on a system where it waits for a triggering event before activating.

An attacker intercepts communications between two network hosts by impersonating each host.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Data redundancy

Power outage

Wiretapping

Denial-of-service

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.

Which of the following does this security threat describe?

Spoofing

Zombie/botnet

Man-in-the-middle

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.

As a first responder, which of the following is the next BEST step to perform?

Investigate how the attack occurred.

Hire a forensic team to gather evidence.

Prevent such an incident from occurring again.

Contain the problem.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?