Security

Security

71 Qs

quiz-placeholder

Similar activities

Seventh Grade Vocabulary Quiz Weeks 3-4

Seventh Grade Vocabulary Quiz Weeks 3-4

7th Grade

68 Qs

2nd Semester CCR Final ACP

2nd Semester CCR Final ACP

KG - University

70 Qs

Free Robux

Free Robux

KG

69 Qs

Prepositions Revision for 1st term EXAM

Prepositions Revision for 1st term EXAM

KG - University

66 Qs

Latihan Soal Kelas 6

Latihan Soal Kelas 6

6th Grade

75 Qs

Unit 2  Business Law Study Guide:  Contract Law

Unit 2 Business Law Study Guide: Contract Law

9th - 12th Grade

70 Qs

MID Junio

MID Junio

University

70 Qs

Security

Security

Assessment

Quiz

others

Practice Problem

Medium

Created by

Fidele Youssaka

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

71 questions

Show all answers

1.

OPEN ENDED QUESTION

1 min • Ungraded

Name and Last Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

1. Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

Phishing
Impersonating
Spyware
Virus

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

2. A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

Man-in-the-Middle
Eavesdropping
Piggybacking
Phishing

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

3. Derik, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Derik has never had a membership before. When he looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?

Trojan horse
Zero-day attack
Man-in-the-middle
Phishing

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

4. What is the best countermeasure against social engineering?

Acceptable use policy
User awareness training
Access auditing
Strong passwords

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

5. You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack. Which of the following would you MOST likely recommend they do to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks.
Establish a written security policy.
Implement a border firewall to filter inbound network traffic.
Train managers to monitor user activity.

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

6. Which of the following is a common form of social engineering attack?

Stealing the key card of an employee and using that to enter a secured building.
Distributing false information about your organization's financial status.
Hoax virus information emails.
Using a sniffer to capture network traffic.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?