
Question Bank
Quiz
•
Computers
•
9th Grade
•
Hard
Esther Brown
Used 4+ times
FREE Resource
Enhance your content in a minute
268 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?
Collectors
Handlers
Filters
SIEM alerts
Answer explanation
The Log Collector is the SIEM component responsible for gathering all event logs from configured devices and securely sending them to the SIEM system.
The Log Collector is responsible for collecting logs from various sources, such as network devices, servers, applications, and databases, and then forwarding them to the SIEM system for analysis.
The Log Collector can also be configured to filter out irrelevant logs and only forward the relevant ones to the SIEM system.
2.
DROPDOWN QUESTION
30 sec • 4 pts
Keeping a switch in a room that is locked by a keypad is the best way to prevent (a) to the device.
Answer explanation
To control access to the switch console, you must keep it in a locked room. A console connection can only be established with a direct physical connection to the device. If the switch is in a locked room, only those with access will be able to make a console connection. In addition, even if you had set console passwords, users with physical access to the device could perform password recovery and gain access.
3.
DRAG AND DROP QUESTION
30 sec • 4 pts
A (a) will stop piggybacking from occurring at an entrance where employees swipe smart cards to gain entry.
Answer explanation
Piggybacking is the activity where an authorized or unauthorized individual gains entry into a secured area by exploiting the credentials of a prior person. Often, the first person will authenticate, unlock the door, and then hold it open for the next person to enter without forcing them to authenticate separately.
You can stop piggybacking with a mantrap. A mantrap is a single-person room with two doors and often includes a scale to prevent piggybacking. It requires proper authentication before unlocking the inner door to allow authorized personal into a secured area. Those who fail to properly authenticate are held captive until authorities respond.
4.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Which of the following can be used with a mantrap to allow an easy exit but actively prevents re-entrance through the exit portal?
Turnstile
Locked door with a push bar.
Card reader
Facial recognition
Answer explanation
Turnstiles allow an easy exit from a secured environment but actively prevent re-entrance through the exit portal. Turnstiles are a common exit portal used with entrance portal mantraps. A turnstile can't be used to enter into a secured facility, as it only functions in one direction.
5.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
When a person presents themselves as a trustworthy person that plays on the victim's emotions to obtain information or access.
Masquerading
Malicious insiders
Social impersonation
Ghosting
Answer explanation
Masquerading is convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
6.
MATCH QUESTION
30 sec • 4 pts
Match the following
Tailgating
The process of looking in the trash for sensitive information that has not been properly disposed of.
Phishing
An email pretending to be from a trusted organization, asking the user to verify personal information or send money
Whaling
An attacker entering a secure building by following an authorized employee through a secure door and not providing identification.
Piggybacking
Tailgating with consent from the authorized employee
Dumpster diving
A form of phishing that is targeted toward senior executives and high-profile victims
Answer explanation
Dumpster Diving
Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.
Tailgating and Piggybacking
Piggybacking and tailgating refer to an attacker entering a secure building by following an authorized employee through a secure door and not providing identification. Piggybacking usually implies consent from the authorized employee, whereas tailgating implies no consent from the authorized employee.
Phishing
A phishing scam is an email pretending to be from a trusted organization, asking the user to verify personal information or send money. In a phishing attack:
A fraudulent message that appears to be legitimate is sent to a target.
The message requests that the target visit a fraudulent website (which also appears to be legitimate). Graphics, links, and websites look almost identical to the legitimate websites they are trying to represent.
The fraudulent website requests that the victim provide sensitive information, such as an account number and password.
Below are descriptions of common phishing scams.
A rock phish kit is a fake website that imitates a real website (such as banks, PayPal, eBay, and Amazon). Phishing emails direct you to the fake website to enter account information. A single server can host multiple fake sites using multiple registered DNS names. These sites can be set up and taken down rapidly to avoid detection.
A Nigerian scam, also known as a 419 scam, involves emails that request a small amount of money to help transfer funds from a foreign country. For your assistance, you are to receive a reward for a much larger amount of money that will be sent to you at a later date.
In spear phishing, attackers gather information about the victim, such as which online banks they use. They then send phishing emails for the specific bank. Spear phishing's goal is to gain access to information that will allow the attacker to gain commercial advantage or commit fraud. Spear phishing frequently involves sending seemingly genuine emails to all employees or members of specific teams.
Whaling is another form of phishing that is targeted toward senior executives and high-profile victims.
Vishing is similar to phishing. But instead of an email, the attacker uses Voice over IP (VoIP) to gain sensitive information. The term is a combination of voice and phishing.
7.
MULTIPLE SELECT QUESTION
30 sec • 4 pts
Which of the following is a common social engineering attack? (Pick two)
Forging employee ID cards
Tailgating through a secure door
Fake phone calls pretending to be from a financial firm
Hoax virus information emails
Answer explanation
Social engineering relies on the trusting nature of individuals to incentivize them to take an action or allow an unauthorized action.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
