
TS Security

Quiz
•
Instructional Technology
•
University
•
Medium
Paul Pesce
Used 5+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of online attack involves pretending to be a legitimate company to get sensitive information?
Impersonating
Spyware
Virus
Phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States.
Eavesdropping
Phishing
Man-in-the-Middle
Piggybacking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.
Which of the following security threats does this describe?
Trojan horse
Phishing
Zero-day attack
Man-in-the-middle
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best countermeasure against social engineering?
Acceptable use policy
User awareness training
Strong passwords
Access auditing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack.
Which of the following would you MOST likely recommend they do to mitigate the risk?
Implement a border firewall to filter inbound network traffic.
Establish a written security policy.
Teach users how to recognize and respond to social engineering attacks.
Train managers to monitor user activity.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common form of social engineering attack?
Using a sniffer to capture network traffic.
Hoax virus information emails.
Stealing the key card of an employee and using that to enter a secured building.
Distributing false information about your organization's financial status.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?
Phishing
Fraggle attack
Social engineering
Session hijacking
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
IT01 Chapter 7

Quiz
•
University
20 questions
THE MAP OF ENGINEERING

Quiz
•
9th Grade - University
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
15 questions
E-Quiz.com

Quiz
•
University
20 questions
ICT 9 Q4 M1 & 2

Quiz
•
9th Grade - University
15 questions
CYBER ADDA

Quiz
•
University
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
15 questions
Tutorial 8 Security

Quiz
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Instructional Technology
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University