Security+ Quiz 1
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Patrick Hines
Used 6+ times
FREE Resource
Enhance your content in a minute
54 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
You have been contacted by your company's CEO after she received a personalized but suspicious e-mail message from the company's bank asking for detailed personal and financial information. After reviewing the message, you determine that it did not originate from the legitimate bank. Which of the following security issues does this scenario describe?
A. Dumpster diving
B. Phishing
C. Whaling
D. Vishing
Answer explanation
Whaling is a type of phishing attack that is targeted at a specific highlevel
user. The victim is usually a high-profile member of the organization
who has much more critical information to lose than the average user. The
messages used in the attack are usually crafted and personalized toward
the specific victim user.
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
During your user awareness training, which of the following actions would you advise users to take as the best security practice to help prevent malware installation from phishing messages?
A. Forward suspicious messages to other users
B. Do not click links in suspicious messages
C. Check e-mail headers
D. Reply to a message to check its legitimacy
Answer explanation
To help prevent malware from being installed, make your users aware
that a best security practice is to never click links in a suspicious message.
The link can take the user to a malicious website that could automatically
install malware on their computer through their web browser.
3.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
Negative company financial information was carelessly thrown in the trash bin without being shredded, and a malicious insider retrieved it and posted it on the Internet, driving the stock price down. The CEO wants to know what happened-what was the attack?
A. Smishing
B. Dumpster diving
C. Prepending
D. Identity fraud
Answer explanation
Dumpster diving occurs when discarded documents (not necessarily
confidential) that were improperly destroyed (or not destroyed at all) are
reconstructed and read (or simply read as is).
4.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
Max, a security administrator, just received a phone call to change the password for a user in the HR department. The user did not provide verification of their identity and insisted that they needed the password changed immediately to complete a critical task. What principle of effective social engineering is being used?
A. Trust
B. Consensus
C. Intimidation
D. Urgency
Answer explanation
Max is being subjected to a social engineering attack that relies on the
principle of urgency—he is being rushed, with the attacker hoping that the
“criticality” of the task forces Max to bypass best security practices.
5.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Which of the following best describes a birthday attack? (Choose two.)
A. A password attack that uses precomputed hashes in its word list
B. Two unique pieces of plaintext can have the same hash value under certain circumstances
C. In a room with 23 people, the odds of any two having the same birthdate is 50 percent
D. A password attack that attempts every single possible combination of characters and password lengths to discover a password
Answer explanation
The birthday attack looks for an input that provides the same
hashed value, regardless of what the original input was. Remembering a
birthday attack is easy if you understand the underlying principle that in a
room with 23 people, the odds of any two having the same birthdate is 50
percent, and the odds increase commensurate with the number of people in
a room.
6.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
You suspect that your server has been compromised because it has been running slowly and is unresponsive. Using a network analyzer, you also notice that large amounts of network data are being sent out from the server. Which of the following is the most likely cause?
A. The server has a rootkit installed.
B. The server requires an operating system update.
C. The server is infected with spyware.
D. The server is part of a botnet.
Answer explanation
If your system has been infected with a worm or virus and has
become part of a botnet, at certain times, it may take part in distributed
denial-of-service attacks on another system on the Internet and may
exhibit slow responsiveness and a large amount of network data being sent
out of the system.
7.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
Antivirus software may not be able to identify which of the following?
A. Trojans
B. Logic bombs
C. Polymorphic viruses
D. Adware
Answer explanation
Logic bombs are simply scripts that are designed to automatically
execute at a particular time or under particular circumstances. While logic
bombs typically perform malicious actions, they are not malicious code
outright, and often are not detected by antivirus programs, especially if
they reside within a trusted application.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
