CompTIA Security+ SY0-601 Chapter 13 - 15

CompTIA Security+ SY0-601 Chapter 13 - 15

University

34 Qs

quiz-placeholder

Similar activities

Blank Quiz

Blank Quiz

University

30 Qs

CW412 PART III

CW412 PART III

University

29 Qs

Grade 2 ICT Computer Keyboard

Grade 2 ICT Computer Keyboard

2nd Grade - University

30 Qs

NETWORK-PRELIM

NETWORK-PRELIM

University

29 Qs

Freehand and Digital Drawing Midterm Exam 2021-2022

Freehand and Digital Drawing Midterm Exam 2021-2022

University

30 Qs

UJIAN MID SEMESTER 1 X RPL SISTEM KOMPUTER

UJIAN MID SEMESTER 1 X RPL SISTEM KOMPUTER

University

35 Qs

sistem enterprise

sistem enterprise

University

29 Qs

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

30 Qs

CompTIA Security+ SY0-601 Chapter 13 - 15

CompTIA Security+ SY0-601 Chapter 13 - 15

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Christopher Wilson

Used 40+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack is most likely when you’re doing sensitive work on your laptop at a coffee shop? Choose the best response

Piggybacking
Dumpster diving
Shoulder surfing
Smurfing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and contained a link to a “test site” and a request to log in with standard user credentials. You never sent it, and on examination, the supposed test site is a phishing scam. Just what variant of phishing is this? Choose the best response

Pharming
Spear phishing
Vishing
Whaling

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What security controls can protect against tailgating? Select all that apply

Alarm systems
Clean desk policy
Mantraps
Security guards
Spam filters

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering attacks are most commonly either in person or over electronic media rather than on the phone. True or false?

true
false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What policy document generally describes mutual goals between organizations? Choose the best response

BPA
ISA
MOU
SLA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which policy is focused on preventing data loss? Choose the best response

AUP
Clean desk policy
Mandatory vacation
Separation of duties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Experts agree that very demanding password policies are the best way to maintain security. True or false?

true
false

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?