MSSR-PRCT-SC+_A

MSSR-PRCT-SC+_A

2nd - 3rd Grade

108 Qs

quiz-placeholder

Similar activities

Review 4 Grade 3 ( No 4)

Review 4 Grade 3 ( No 4)

3rd Grade

107 Qs

U7  Online Hw2

U7 Online Hw2

2nd Grade

110 Qs

Language Arts

Language Arts

2nd Grade

108 Qs

LATIHAN SOAL BAB 5 KELAS 2

LATIHAN SOAL BAB 5 KELAS 2

2nd Grade

110 Qs

TEST UNIT: JOBS AND OCCUPATIONS

TEST UNIT: JOBS AND OCCUPATIONS

2nd Grade

113 Qs

FORTNITE🥺

FORTNITE🥺

3rd Grade

104 Qs

Mathematics term 3 test 3

Mathematics term 3 test 3

2nd Grade

103 Qs

home 2.8

home 2.8

2nd Grade

105 Qs

MSSR-PRCT-SC+_A

MSSR-PRCT-SC+_A

Assessment

Quiz

English

2nd - 3rd Grade

Easy

Created by

Marq Valenzuela

Used 20+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

108 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker obtains bank account number

and birth date by calling the victim

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

Social engineering over the telephone continues to be an effective attack vector,

and obtaining personal information such as a bank account or birth date would

be considered phishing over voice, or vishing.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker modifies a legitimate DNS server to resolve

the IP address of a malicious site

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

Spoofing happens any time a device pretends to be another device. If a DNS

server has been modified to hand out the IP address of a different server, then

it's spoofing the IP address of the attacker.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker intercepts all communication between

a client and a web server

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

On-path attacks are quite effective because the attacker can often sit invisibly

between two devices and gather useful information or modify the data streams

in real-time.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple attackers

overwhelm a web server

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

A DoS (Denial of Service) occurs when a service is unavailable due to the

effects of a third-party. A DDoS (Distributed Denial of Service) occurs when

multiple third-parties work together to create a service outage.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus alert appears in your browser from Microsoft

with a phone number to call for support

Vishing

Spoofing

On-path

DDoS

Hoax

Answer explanation

A threat that seems real but doesn't actually exist is a hoax. In this example, a

fake web site message is trying to convince you that this fake threat is actually a

real security issue.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The security team at a local public library system is creating a set of

minimum security standards for the various computer systems.

Select the BEST security control for each available placeholder.

Location:

Library

Web Server and

Database Server

Description:

Computer Room

High security

Choose 3.

Locking Cabinets

Environmental Sensors

Video Surveillance

Full-Disk Encryption

Biometric Reader

Answer explanation

The security in the computer room requires both physical security and ongoing

surveillance. The locking cabinets will secure the physical equipment, and the

video surveillance will provide a method to monitor the systems without being

physically present. Including an environmental sensor will provide information

about the temperature and humidity levels in the computer room.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The security team at a local public library system is creating a set of

minimum security standards for the various computer systems.

Select the BEST security control for each available placeholder.

Location:

Library

Employee

Laptops

Description:

Offsite use

Contains PII

Choose 2.

Locking Cabinets

Environmental Sensors

Video Surveillance

Full-Disk Encryption

Biometric Reader

Answer explanation

Since the laptops are used away from the main location, it's important to

protect the data and provide additional authentication options. The storage

drives on the laptop should be configured with FDE (full-disk encryption) and

a biometric reader on the laptop can ensure that the proper users have access.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?