IT Fundamentals - Security Threats and Authentication

IT Fundamentals - Security Threats and Authentication

10th Grade

20 Qs

quiz-placeholder

Similar activities

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

Big Idea 5

Big Idea 5

9th - 12th Grade

16 Qs

OCR GCSE CS MCQs 2.3 Defensive Design

OCR GCSE CS MCQs 2.3 Defensive Design

10th - 11th Grade

20 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

WJEC ICT - Chapter 3 - Data Protection Methods

WJEC ICT - Chapter 3 - Data Protection Methods

10th Grade

20 Qs

ITF Cert Review

ITF Cert Review

9th - 12th Grade

15 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

9th - 12th Grade

20 Qs

IT Fundamentals - Security Threats and Authentication

IT Fundamentals - Security Threats and Authentication

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Anasia Napper

Used 12+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best countermeasure against social engineering?

Access auditing

Strong passwords

User awareness training

Acceptable use policy

Answer explanation

The best countermeasure to social engineering is user awareness training. If users understand the importance of security and the restrictions on types of information, they are less likely to reveal confidential information or perform unauthorized activities at the prompting of a stranger or a claimed identity over the phone.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of social engineering attack?

Stealing the key card of an employee and using that to enter a secured building.

Using a sniffer to capture network traffic.

Distributing false information about your organization's financial status.

Hoax virus information emails.

Answer explanation

Hoax virus information emails are a form of social engineering attack. This type of attack preys on email recipients who are fearful and will believe most information if it is presented in a professional manner. All too often, the victims of these attacks fail to double check the information or instructions with a reputable third-party anti-virus software vendor before implementing the recommendations. Usually these hoax messages instruct the reader to delete key system files or download Trojan horses. Social engineering relies on the trusting nature of individuals to take an action or allow unauthorized action.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Reply to the sender and ask if the attachment is safe

Forward the email to a friend and ask for advice

Open the attachment because he has anti-virus software installed

Delete the email without opening the attachment

Answer explanation

Mark should delete the email without opening the attachment. There are a variety of spelling errors, which wouldn't likely happen if the email were from a real software company. The attachment almost certainly contains malware that would install on Mark's system if he opened it. He should not forward or reply to the email.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Man-in-the-Middle attack?

An IP packet is constructed which is larger than the valid size.

A person over the phone convinces an employee to reveal their logon credentials.

Malicious code is planted on a system where it waits for a triggering event before activating.

An attacker intercepts communications between two network hosts by impersonating each host.

Answer explanation

A Man-in-the-Middle attack is a technological attack where a malicious person intercepts network communications between two hosts, posing as the sender to the receiver and as the receiver to the sender.

Convincing an employee to reveal his logon credentials over the phone is an example of a social engineering attack. Constructing an IP packet which is larger than the valid size is a form of denial-of-service attack. Planting malicious code on a system where it waits for a triggering event before activating is a logic bomb.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

Denial-of-service

Wiretapping

Data redundancy

Answer explanation

Critical systems such as database servers and web servers need to be equipped with a UPS, or uninterruptible power supply. These devices provide a temporary power source during an outage that gives the system enough time to shut down cleanly without data loss or corruption.

Data redundancy is a method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.

A denial-of-service attack attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

Wiretapping is a form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Man-in-the-middle

Spoofing

Phishing

Zombie/botnet

Answer explanation

Devices that are infected with malware that can be remotely controlled by an attacker are known as zombies. A collection of these zombies that are controlled by the same attacker are known as a botnet (robot network).

Phishing is an attempt to trick a user into compromising personal information or downloading malware. Most often it involves an email containing a malicious attachment or hyperlink.

A man-in-the-middle (MITM) attack intercepts communications between two systems and alters the message before sending it on to the original recipient.

Spoofing is when an entity misrepresents itself by using a fake IP address or, more commonly, a fake email address that resembles a real address. The person being spoofed may not immediately discover that the address is fake.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.

As a first responder, which of the following is the next BEST step to perform?

Prevent such an incident from occurring again.

Contain the problem.

Hire a forensic team to gather evidence.

Investigate how the attack occurred.

Answer explanation

You have already identified the issue, so the next step is to take actions to stop the attack and contain the damage. Although it is important to preserve as much information as possible to assist in later investigations, it might be better to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?