Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?
Security+

Quiz
•
Professional Development
•
Professional Development
•
Medium

Kerwin Vialva
Used 1+ times
FREE Resource
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A phishing email stating a cash settlement has been awarded but will expire soon
A smishing message stating a package is scheduled for pickup
A vishing call that requests a donation be made to a local charity
A SPIM notification claiming to be undercover law enforcement investigating a cybercrime
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A company is implementing a DLP solution on the file server. The file server has PII, financial information, and health information stored on it. Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the following should the company do to help accomplish this goal?
Classify the data
Mask the data
Assign the application owner
Perform a risk analysis.
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?
Subject alternative name
Wildcard
Self-signed
Domain validation
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?
DLP
NIDS
TPM
FDE
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?
Installing and monitoring a camera facing the door
Replacing the traditional key with an RFID key
Setting motion-sensing lights to illuminate the door on activity
Surrounding the property with fencing and gates
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?
Hashing
Tokenization
Masking
Encryption
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?
S/MIME
SSH
LDAPS
SRTP
Create a free account and access millions of resources
Similar Resources on Quizizz
17 questions
BCS Network Security Quiz 5

Quiz
•
University - Professi...
19 questions
AWS ACF Módulo 4 - Segurança na nuvem

Quiz
•
Professional Development
20 questions
Git Introduction

Quiz
•
University - Professi...
17 questions
Basic Civil Engineering

Quiz
•
Professional Development
21 questions
Paxton Net2 Systems and Access Control Relays Quiz

Quiz
•
Professional Development
20 questions
AWS Chapter 5 IAM

Quiz
•
Professional Development
21 questions
IT Fundamentals+ Network, Security Concepts & Databases

Quiz
•
Professional Development
25 questions
CompTIA Security+ Quiz

Quiz
•
Professional Development
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade