Security+ Quiz 1

Security+ Quiz 1

Professional Development

54 Qs

quiz-placeholder

Similar activities

CompTIA Network+ N10-008 Chapter 9 - 12

CompTIA Network+ N10-008 Chapter 9 - 12

Cyber Hygiene P1

Cyber Hygiene P1

ITF+ 6.5 to 6.7 Practice

ITF+ 6.5 to 6.7 Practice

CrashCourse Computer Science: Cybersecurity Quiz

CrashCourse Computer Science: Cybersecurity Quiz

Security 1.3.22

Security 1.3.22

Security+ Quiz 1

Security+ Quiz 1

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Patrick Hines

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

54 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

You have been contacted by your company's CEO after she received a personalized but suspicious e-mail message from the company's bank asking for detailed personal and financial information. After reviewing the message, you determine that it did not originate from the legitimate bank. Which of the following security issues does this scenario describe?

A. Dumpster diving

B. Phishing

C. Whaling

D. Vishing

Answer explanation

Whaling is a type of phishing attack that is targeted at a specific highlevel

user. The victim is usually a high-profile member of the organization

who has much more critical information to lose than the average user. The

messages used in the attack are usually crafted and personalized toward

the specific victim user.

2.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

During your user awareness training, which of the following actions would you advise users to take as the best security practice to help prevent malware installation from phishing messages?

A. Forward suspicious messages to other users

B. Do not click links in suspicious messages

C. Check e-mail headers

D. Reply to a message to check its legitimacy

Answer explanation

To help prevent malware from being installed, make your users aware

that a best security practice is to never click links in a suspicious message.

The link can take the user to a malicious website that could automatically

install malware on their computer through their web browser.

3.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

Negative company financial information was carelessly thrown in the trash bin without being shredded, and a malicious insider retrieved it and posted it on the Internet, driving the stock price down. The CEO wants to know what happened-what was the attack?

A. Smishing

B. Dumpster diving

C. Prepending

D. Identity fraud

Answer explanation

Dumpster diving occurs when discarded documents (not necessarily

confidential) that were improperly destroyed (or not destroyed at all) are

reconstructed and read (or simply read as is).

4.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

Max, a security administrator, just received a phone call to change the password for a user in the HR department. The user did not provide verification of their identity and insisted that they needed the password changed immediately to complete a critical task. What principle of effective social engineering is being used?

A. Trust

B. Consensus

C. Intimidation

D. Urgency

Answer explanation

Max is being subjected to a social engineering attack that relies on the

principle of urgency—he is being rushed, with the attacker hoping that the

“criticality” of the task forces Max to bypass best security practices.

5.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Which of the following best describes a birthday attack? (Choose two.)

A. A password attack that uses precomputed hashes in its word list

B. Two unique pieces of plaintext can have the same hash value under certain circumstances

C. In a room with 23 people, the odds of any two having the same birthdate is 50 percent

D. A password attack that attempts every single possible combination of characters and password lengths to discover a password

Answer explanation

The birthday attack looks for an input that provides the same

hashed value, regardless of what the original input was. Remembering a

birthday attack is easy if you understand the underlying principle that in a

room with 23 people, the odds of any two having the same birthdate is 50

percent, and the odds increase commensurate with the number of people in

a room.

6.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

You suspect that your server has been compromised because it has been running slowly and is unresponsive. Using a network analyzer, you also notice that large amounts of network data are being sent out from the server. Which of the following is the most likely cause?

A. The server has a rootkit installed.

B. The server requires an operating system update.

C. The server is infected with spyware.

D. The server is part of a botnet.

Answer explanation

If your system has been infected with a worm or virus and has

become part of a botnet, at certain times, it may take part in distributed

denial-of-service attacks on another system on the Internet and may

exhibit slow responsiveness and a large amount of network data being sent

out of the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

Antivirus software may not be able to identify which of the following?

A. Trojans

B. Logic bombs

C. Polymorphic viruses

D. Adware

Answer explanation

Logic bombs are simply scripts that are designed to automatically

execute at a particular time or under particular circumstances. While logic

bombs typically perform malicious actions, they are not malicious code

outright, and often are not detected by antivirus programs, especially if

they reside within a trusted application.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?