What is the best countermeasure against social engineering?
IT Fundamentals - Security Threats and Authentication

Quiz
•
Computers
•
10th Grade
•
Hard
Anasia Napper
Used 12+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Access auditing
Strong passwords
User awareness training
Acceptable use policy
Answer explanation
The best countermeasure to social engineering is user awareness training. If users understand the importance of security and the restrictions on types of information, they are less likely to reveal confidential information or perform unauthorized activities at the prompting of a stranger or a claimed identity over the phone.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common form of social engineering attack?
Stealing the key card of an employee and using that to enter a secured building.
Using a sniffer to capture network traffic.
Distributing false information about your organization's financial status.
Hoax virus information emails.
Answer explanation
Hoax virus information emails are a form of social engineering attack. This type of attack preys on email recipients who are fearful and will believe most information if it is presented in a professional manner. All too often, the victims of these attacks fail to double check the information or instructions with a reputable third-party anti-virus software vendor before implementing the recommendations. Usually these hoax messages instruct the reader to delete key system files or download Trojan horses. Social engineering relies on the trusting nature of individuals to take an action or allow unauthorized action.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Reply to the sender and ask if the attachment is safe
Forward the email to a friend and ask for advice
Open the attachment because he has anti-virus software installed
Delete the email without opening the attachment
Answer explanation
Mark should delete the email without opening the attachment. There are a variety of spelling errors, which wouldn't likely happen if the email were from a real software company. The attachment almost certainly contains malware that would install on Mark's system if he opened it. He should not forward or reply to the email.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a Man-in-the-Middle attack?
An IP packet is constructed which is larger than the valid size.
A person over the phone convinces an employee to reveal their logon credentials.
Malicious code is planted on a system where it waits for a triggering event before activating.
An attacker intercepts communications between two network hosts by impersonating each host.
Answer explanation
A Man-in-the-Middle attack is a technological attack where a malicious person intercepts network communications between two hosts, posing as the sender to the receiver and as the receiver to the sender.
Convincing an employee to reveal his logon credentials over the phone is an example of a social engineering attack. Constructing an IP packet which is larger than the valid size is a form of denial-of-service attack. Planting malicious code on a system where it waits for a triggering event before activating is a logic bomb.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Power outage
Denial-of-service
Wiretapping
Data redundancy
Answer explanation
Critical systems such as database servers and web servers need to be equipped with a UPS, or uninterruptible power supply. These devices provide a temporary power source during an outage that gives the system enough time to shut down cleanly without data loss or corruption.
Data redundancy is a method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
A denial-of-service attack attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
Wiretapping is a form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?
Man-in-the-middle
Spoofing
Phishing
Zombie/botnet
Answer explanation
Devices that are infected with malware that can be remotely controlled by an attacker are known as zombies. A collection of these zombies that are controlled by the same attacker are known as a botnet (robot network).
Phishing is an attempt to trick a user into compromising personal information or downloading malware. Most often it involves an email containing a malicious attachment or hyperlink.
A man-in-the-middle (MITM) attack intercepts communications between two systems and alters the message before sending it on to the original recipient.
Spoofing is when an entity misrepresents itself by using a fake IP address or, more commonly, a fake email address that resembles a real address. The person being spoofed may not immediately discover that the address is fake.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
Prevent such an incident from occurring again.
Contain the problem.
Hire a forensic team to gather evidence.
Investigate how the attack occurred.
Answer explanation
You have already identified the issue, so the next step is to take actions to stop the attack and contain the damage. Although it is important to preserve as much information as possible to assist in later investigations, it might be better to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
FOC Digital Security

Quiz
•
9th - 10th Grade
22 questions
J836 Recap 5.4.3 Prevention Measures

Quiz
•
10th Grade - University
15 questions
GCSE - 2.3 Producing Robust Programs

Quiz
•
9th - 11th Grade
25 questions
Networks Issues and Communication

Quiz
•
10th Grade
20 questions
security best practices

Quiz
•
10th Grade - University
18 questions
Big Idea 5: Impact of Computing

Quiz
•
9th - 12th Grade
20 questions
March 7 Quiz

Quiz
•
10th Grade
20 questions
General ICT Questions (Part 1)

Quiz
•
5th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University