Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?
1002 A + Ch 04 & 05 Security Principles & Security Technologies

Quiz
•
Instructional Technology, Computers
•
Professional Development
•
Medium

Brandon Dewater
Used 10+ times
FREE Resource
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social engineering
Ransomware
Man-in-the-middle
Shoulder surfing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of security threat where a collection of infected computers is used together to deliver spam, spread malware, or other attacks?
Phishing
Botnet
Logic bomb
Man-in-the-middle
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?
Trojan horse
Spyware
Social engineering
Worms
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment is ________.
Social engineering
Spoofing
Zero-day
Man-in-the-middle
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user in the accounting department is not able to access a file on the network accounting folder. What is the likely reason?
The workstation is victim of a denial-of-service attack
The username is not authenticating on the network
The user does not have file level permissions
The administrator has not applied appropriate security patches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
VPN
ACL
RDP
DLP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of setting practices and procedures that govern how an organization will respond to a data security breach?
Incident Management
Disaster Recovery Plan
Business Impact Analysis
Group Security Policy Settings
Create a free account and access millions of resources
Similar Resources on Quizizz
29 questions
Understanding Malware and Its Types

Quiz
•
Professional Development
30 questions
AZ-900 - Azure Fundamentals (Module 1)

Quiz
•
Professional Development
30 questions
Smyrna IT Night | CompTIA A+ 1102 | Questions 31 - 60

Quiz
•
Professional Development
35 questions
Security+ Wireless Networking and Security

Quiz
•
Professional Development
28 questions
Cyber Crime Investigation

Quiz
•
Professional Development
36 questions
Net+ DAY 5 and 6 Wireless Networking Cloud Concepts and Virtuali

Quiz
•
Professional Development
30 questions
Net+ Day 2 Ports, Protocols and Network Devices

Quiz
•
Professional Development
30 questions
Net+ Day 3 Network Devices

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade