Security 5

Security 5

Assessment

Assessment

Created by

Paul Getz

Computers

11th Grade

1 plays

Hard

Student preview

quiz-placeholder

25 questions

Show all answers

1.

MULTIPLE CHOICE

30 sec • 1 pt

A computer user in the accounting department received a phone call from someone who claimed to be from the company's bank. They had a partial account number and needed the user to verify the full account number, their username, and password before they could discuss the reason for their call with the user. The user said they would call them back, and the caller on the other end hung up abruptly. They contacted you in the IT department because it seemed like such a strange call. What kind of attempted attack will you tell them just happened?

2.

MULTIPLE CHOICE

30 sec • 1 pt

Your company allows employees to use their personal devices for company work, because it will save the company money on hardware. What is this called?

3.

MULTIPLE CHOICE

30 sec • 1 pt

Why is an EOL OS a security threat?

4.

MULTIPLE CHOICE

30 sec • 1 pt

What type of malware is dangerous because it is loaded during system startup before the antivirus software is able to load?

5.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is not a type of malware that needs to be eradicated from a computer system?

6.

MULTIPLE CHOICE

30 sec • 1 pt

You believe your computer has contracted a boot sector virus. Which command-line tool permits someone to make changes to the operating system without having to boot up Windows?

7.

MULTIPLE CHOICE

30 sec • 1 pt

You're reviewing the Event Viewer logs and notice repeated failed attempts to access the corporate bank account information. The attempts are coming from someone with a company login, and in fact, you are able to catch the person, an employee hired only a month ago, in the act. What type of attack is this?

8.

MULTIPLE CHOICE

30 sec • 1 pt

Your web server just crashed because there was a flood of responses to a packet that looks like it was from your server but your server didn't send it. What just happened?

9.

MULTIPLE CHOICE

30 sec • 1 pt

A computer user on your network is trying to access a folder named Projects on a local NTFS volume. Their user account is in the Developers group. The Developers group has Read & Execute permissions to the folder, and the user's user account has Full Control. What is the user's effective access to the Projects folder?

10.

MULTIPLE CHOICE

30 sec • 1 pt

You've discovered that a system on your network has had its firewall turned off and antivirus disabled. What type of vulnerability does this present?

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?