1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Professional Development

33 Qs

quiz-placeholder

Similar activities

Development of Varied Assessment Tools

Development of Varied Assessment Tools

Professional Development

35 Qs

artificial  intelligence

artificial intelligence

University - Professional Development

30 Qs

Elements of Art and  Principles of Design - Quiz 1

Elements of Art and Principles of Design - Quiz 1

10th Grade - Professional Development

30 Qs

Cyber Security

Cyber Security

Professional Development

35 Qs

Linux Creating Scripts

Linux Creating Scripts

Professional Development

28 Qs

CTFL-22W2-1129

CTFL-22W2-1129

Professional Development

28 Qs

SSDLC

SSDLC

Professional Development

28 Qs

Programming Logic and Design Chapter 3 - Understanding Structure

Programming Logic and Design Chapter 3 - Understanding Structure

Professional Development

35 Qs

1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Assessment

Quiz

Instructional Technology, Computers

Professional Development

Practice Problem

Medium

Created by

Brandon Dewater

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?

Social engineering

Ransomware

Man-in-the-middle

Shoulder surfing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security threat where a collection of infected computers is used together to deliver spam, spread malware, or other attacks?

Phishing

Botnet

Logic bomb

Man-in-the-middle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

Trojan horse

Spyware

Social engineering

Worms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment is ________.

Social engineering

Spoofing

Zero-day

Man-in-the-middle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user in the accounting department is not able to access a file on the network accounting folder. What is the likely reason?

The workstation is victim of a denial-of-service attack

The username is not authenticating on the network

The user does not have file level permissions

The administrator has not applied appropriate security patches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

VPN

ACL

RDP

DLP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of setting practices and procedures that govern how an organization will respond to a data security breach?

Incident Management

Disaster Recovery Plan

Business Impact Analysis

Group Security Policy Settings

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology