
Lesson 16

Quiz
•
Computers
•
Professional Development
•
Medium
Christina McCain
Used 7+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality and integrity are two important properties of information stored in a secure retrieval system. What is the third property?
Information
Accessibility
Authorization
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false? The level of risk from zero-day attacks is only significant with respect to EOL systems.
True
False
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor crafts an email addressed to a senior support technician inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?
Phishing
Tailgating
Impersonation
Spear phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are assisting with the development of end-user security awareness documentation. Covertly observing someone type a PIN or password or other confidential data is called what?
Social engineering
Shoulder surfing
Piggybacking
Tailgating
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named “Internet” and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?
Evil twin
On-path attack
MITM
SQL injection
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor recovers some documents via dumpster diving and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of password cracking attack is this vulnerable?
Social engineering
Human-hacking
Brute force
Dictionary
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cryptographic key is delivered in a digital certificate?
Digital key
Public key
Private key
Decrypt key
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
ITF - Quiz 13.1 - Securing Devices

Quiz
•
Professional Development
20 questions
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Quiz
•
Professional Development
20 questions
Part 4.1

Quiz
•
Professional Development
15 questions
AWS Identity and Access Management (IAM) Quiz

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
16 questions
Cyber Resilience Training

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade