
Security 5
Assessment
•
Paul Getz
•
Computers
•
11th Grade
•
1 plays
•
Hard
Student preview

25 questions
Show all answers
1.
MULTIPLE CHOICE
30 sec • 1 pt
A computer user in the accounting department received a phone call from someone who claimed to be from the company's bank. They had a partial account number and needed the user to verify the full account number, their username, and password before they could discuss the reason for their call with the user. The user said they would call them back, and the caller on the other end hung up abruptly. They contacted you in the IT department because it seemed like such a strange call. What kind of attempted attack will you tell them just happened?
2.
MULTIPLE CHOICE
30 sec • 1 pt
Your company allows employees to use their personal devices for company work, because it will save the company money on hardware. What is this called?
3.
MULTIPLE CHOICE
30 sec • 1 pt
Why is an EOL OS a security threat?
4.
MULTIPLE CHOICE
30 sec • 1 pt
What type of malware is dangerous because it is loaded during system startup before the antivirus software is able to load?
5.
MULTIPLE CHOICE
30 sec • 1 pt
Which of the following is not a type of malware that needs to be eradicated from a computer system?
6.
MULTIPLE CHOICE
30 sec • 1 pt
You believe your computer has contracted a boot sector virus. Which command-line tool permits someone to make changes to the operating system without having to boot up Windows?
7.
MULTIPLE CHOICE
30 sec • 1 pt
You're reviewing the Event Viewer logs and notice repeated failed attempts to access the corporate bank account information. The attempts are coming from someone with a company login, and in fact, you are able to catch the person, an employee hired only a month ago, in the act. What type of attack is this?
8.
MULTIPLE CHOICE
30 sec • 1 pt
Your web server just crashed because there was a flood of responses to a packet that looks like it was from your server but your server didn't send it. What just happened?
9.
MULTIPLE CHOICE
30 sec • 1 pt
A computer user on your network is trying to access a folder named Projects on a local NTFS volume. Their user account is in the Developers group. The Developers group has Read & Execute permissions to the folder, and the user's user account has Full Control. What is the user's effective access to the Projects folder?
10.
MULTIPLE CHOICE
30 sec • 1 pt
You've discovered that a system on your network has had its firewall turned off and antivirus disabled. What type of vulnerability does this present?
Explore all questions with a free account
Similar Resources on Quizizz
Computer Basics
•
9th - 12th Grade
Operating Systems
•
10th - 12th Grade
L3: Understanding Security Policies
•
9th - 12th Grade
General ICT Questions (Part 1)
•
5th - 12th Grade
ITS Study Guide
•
9th - 11th Grade
SERVER ESSENTIAL LA2
•
KG - Professional Dev...
QuickBooks Online Exam Review
•
9th - 12th Grade
Operating Systems
•
10th - 11th Grade