Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

TS Security

Quiz
•
Paul Pesce
•
Instructional Technology
•
University
•
5 plays
•
Medium
Student preview

20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Impersonating
Spyware
Virus
Phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States.
Eavesdropping
Phishing
Man-in-the-Middle
Piggybacking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.
Which of the following security threats does this describe?
Trojan horse
Phishing
Zero-day attack
Man-in-the-middle
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best countermeasure against social engineering?
Acceptable use policy
User awareness training
Strong passwords
Access auditing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack.
Which of the following would you MOST likely recommend they do to mitigate the risk?
Implement a border firewall to filter inbound network traffic.
Establish a written security policy.
Teach users how to recognize and respond to social engineering attacks.
Train managers to monitor user activity.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common form of social engineering attack?
Using a sniffer to capture network traffic.
Hoax virus information emails.
Stealing the key card of an employee and using that to enter a secured building.
Distributing false information about your organization's financial status.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?
Phishing
Fraggle attack
Social engineering
Session hijacking
8.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Dana is an IT administrator who is working on a company-wide initiative to address confidentiality concerns about secure information being revealed to unauthorized individuals.
Which of the following would be topics on the team agenda? (Select two.)
Replay attack
Snooping
Data destruction
Social engineering
9.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are examples of social engineering? (Select two.)
Port scanning
Shoulder surfing
Dumpster diving
Brute force password cracking
10.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maintaining confidentiality in the workplace is important for building and maintaining trust and for ensuring an open and honest communication between customers, clients, and employees. Which of the following threatens data confidentiality?
Replay attacks
Power outages
Man-in-the-Middle attacks
Dumpster diving
Explore all questions with a free account
Similar Resources on Quizizz
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
15 questions
Security Awareness Quiz

Quiz
•
University
18 questions
BCS Network Security Test 4

Quiz
•
University
25 questions
Quiz 2 - HM141P

Quiz
•
University
20 questions
CySa+ PT 4: 2/3

Quiz
•
9th Grade - Professio...
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
15 questions
ICT 9 Q4 M5

Quiz
•
9th Grade - University
20 questions
Quiz IT

Quiz
•
University
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd

Quiz
•
3rd Grade
15 questions
Grade 3 Simulation Assessment 1

Quiz
•
3rd Grade
20 questions
math review

Quiz
•
4th Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2425sy

Quiz
•
5th Grade
16 questions
Grade 3 Simulation Assessment 2

Quiz
•
3rd Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
13 questions
Cinco de mayo

Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
Discover more resources for Instructional Technology
7 questions
Food Webs and Energy Pyramids: Bedrocks of Biodiversity

Interactive video
•
11th Grade - University
25 questions
APUSH Decades Review

Quiz
•
9th Grade - University
12 questions
Scientific Notation

Quiz
•
University
96 questions
World History 1 Sol Review

Quiz
•
9th Grade - University
22 questions
Spanish subjunctive

Quiz
•
9th Grade - University
7 questions
Text Structure and Genre

Interactive video
•
4th Grade - University
20 questions
The Giver - Chapter 1-5

Quiz
•
KG - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University