Security 5

Security 5

11th Grade

25 Qs

quiz-placeholder

Similar activities

Network topologies

Network topologies

8th Grade - University

20 Qs

Visualisasi data

Visualisasi data

8th Grade - University

20 Qs

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

SQL Revision for Year 12

SQL Revision for Year 12

11th - 12th Grade

20 Qs

Jadi Programmer | Kampung Koding

Jadi Programmer | Kampung Koding

10th Grade - Professional Development

20 Qs

voip

voip

11th Grade

20 Qs

Arduino Loop

Arduino Loop

2nd Grade - University

20 Qs

GAD Review - Game Industry

GAD Review - Game Industry

9th - 12th Grade

22 Qs

Security 5

Security 5

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Paul Getz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer user in the accounting department received a phone call from someone who claimed to be from the company's bank. They had a partial account number and needed the user to verify the full account number, their username, and password before they could discuss the reason for their call with the user. The user said they would call them back, and the caller on the other end hung up abruptly. They contacted you in the IT department because it seemed like such a strange call. What kind of attempted attack will you tell them just happened?

Phishing

Vishing

Whaling

Evil twin

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company allows employees to use their personal devices for company work, because it will save the company money on hardware. What is this called?

BYOD

MDM

SSO

UAC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is an EOL OS a security threat?

There will be no more security updates.

There will be no more feature updates.

There will be no more company support.

The software will stop working on the EOL date.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is dangerous because it is loaded during system startup before the antivirus software is able to load?

Spyware

Ransomware

Boot sector virus

Keylogger

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a type of malware that needs to be eradicated from a computer system?

Keylogger

Virus

WinRE

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You believe your computer has contracted a boot sector virus. Which command-line tool permits someone to make changes to the operating system without having to boot up Windows?

WinRE

RADIUS

Administrative tools

Active Directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're reviewing the Event Viewer logs and notice repeated failed attempts to access the corporate bank account information. The attempts are coming from someone with a company login, and in fact, you are able to catch the person, an employee hired only a month ago, in the act. What type of attack is this?

Insider threat

Eval twin

Whaling

Social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?