TS Security

TS Security

University

20 Qs

quiz-placeholder

Similar activities

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

BCS Network Security Test 8

BCS Network Security Test 8

University - Professional Development

22 Qs

CompTIA A+ 1002 201-220

CompTIA A+ 1002 201-220

University

20 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Quiz 2 - HM141P

Quiz 2 - HM141P

University

25 Qs

Lesson 3 (Model Training)

Lesson 3 (Model Training)

University

20 Qs

Testout Security 4.1-4.2

Testout Security 4.1-4.2

11th Grade - University

20 Qs

BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

TS Security

TS Security

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

Impersonating

Spyware

Virus

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States.

Eavesdropping

Phishing

Man-in-the-Middle

Piggybacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Joe, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

Trojan horse

Phishing

Zero-day attack

Man-in-the-middle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best countermeasure against social engineering?

Acceptable use policy

User awareness training

Strong passwords

Access auditing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack.

Which of the following would you MOST likely recommend they do to mitigate the risk?

Implement a border firewall to filter inbound network traffic.

Establish a written security policy.

Teach users how to recognize and respond to social engineering attacks.

Train managers to monitor user activity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of social engineering attack?

Using a sniffer to capture network traffic.

Hoax virus information emails.

Stealing the key card of an employee and using that to enter a secured building.

Distributing false information about your organization's financial status.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

Fraggle attack

Social engineering

Session hijacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?