MSSR-PRCT-SC+_A

MSSR-PRCT-SC+_A

2nd - 3rd Grade

108 Qs

quiz-placeholder

Similar activities

Expository Midterms

Expository Midterms

2nd Grade

106 Qs

2nd Grade Wonders Unit 3.1

2nd Grade Wonders Unit 3.1

2nd Grade

111 Qs

Language Arts

Language Arts

2nd Grade

108 Qs

Be a Rock STAAR!5th grade Reading

Be a Rock STAAR!5th grade Reading

3rd - 6th Grade

103 Qs

ELA: Homonyms

ELA: Homonyms

KG - University

105 Qs

IOE 4 number 1

IOE 4 number 1

3rd - 5th Grade

106 Qs

Mathematics term 3 test 3

Mathematics term 3 test 3

2nd Grade

103 Qs

MSSR-PRCT-SC+_A

MSSR-PRCT-SC+_A

Assessment

Quiz

English

2nd - 3rd Grade

Easy

Created by

Marq Valenzuela

Used 20+ times

FREE Resource

108 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker obtains bank account number

and birth date by calling the victim

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

Social engineering over the telephone continues to be an effective attack vector,

and obtaining personal information such as a bank account or birth date would

be considered phishing over voice, or vishing.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker modifies a legitimate DNS server to resolve

the IP address of a malicious site

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

Spoofing happens any time a device pretends to be another device. If a DNS

server has been modified to hand out the IP address of a different server, then

it's spoofing the IP address of the attacker.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker intercepts all communication between

a client and a web server

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

On-path attacks are quite effective because the attacker can often sit invisibly

between two devices and gather useful information or modify the data streams

in real-time.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple attackers

overwhelm a web server

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

A DoS (Denial of Service) occurs when a service is unavailable due to the

effects of a third-party. A DDoS (Distributed Denial of Service) occurs when

multiple third-parties work together to create a service outage.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus alert appears in your browser from Microsoft

with a phone number to call for support

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

A threat that seems real but doesn't actually exist is a hoax. In this example, a

fake web site message is trying to convince you that this fake threat is actually a

real security issue.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The security team at a local public library system is creating a set of

minimum security standards for the various computer systems.

Select the BEST security control for each available placeholder.

Location:

Library

Web Server and

Database Server

Description:

Computer Room

High security

Choose 3.

Locking Cabinets

Environmental Sensors

Video Surveillance

Full-Disk Encryption

Biometric Reader

Answer explanation

The security in the computer room requires both physical security and ongoing

surveillance. The locking cabinets will secure the physical equipment, and the

video surveillance will provide a method to monitor the systems without being

physically present. Including an environmental sensor will provide information

about the temperature and humidity levels in the computer room.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The security team at a local public library system is creating a set of

minimum security standards for the various computer systems.

Select the BEST security control for each available placeholder.

Location:

Library

Employee

Laptops

Description:

Offsite use

Contains PII

Choose 2.

Locking Cabinets

Environmental Sensors

Video Surveillance

Full-Disk Encryption

Biometric Reader

Answer explanation

Since the laptops are used away from the main location, it's important to

protect the data and provide additional authentication options. The storage

drives on the laptop should be configured with FDE (full-disk encryption) and

a biometric reader on the laptop can ensure that the proper users have access.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?