Lesson 16

Lesson 16

Professional Development

16 Qs

quiz-placeholder

Similar activities

Security + Day 6 Review

Security + Day 6 Review

Professional Development

11 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

Hacker Academy Basic Training Quiz

Hacker Academy Basic Training Quiz

Professional Development

15 Qs

Cyber security and Data protection Test

Cyber security and Data protection Test

Professional Development

20 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Digital Security

Digital Security

Professional Development

13 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Professional Development

15 Qs

Lesson 16

Lesson 16

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Christina McCain

Used 7+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confidentiality and integrity are two important properties of information stored in a secure retrieval system. What is the third property?

Information

Accessibility

Authorization

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? The level of risk from zero-day attacks is only significant with respect to EOL systems.

True

False

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A threat actor crafts an email addressed to a senior support technician inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?

Phishing

Tailgating

Impersonation

Spear phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are assisting with the development of end-user security awareness documentation. Covertly observing someone type a PIN or password or other confidential data is called what?

Social engineering

Shoulder surfing

Piggybacking

Tailgating

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named “Internet” and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?

Evil twin

On-path attack

MITM

SQL injection

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A threat actor recovers some documents via dumpster diving and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of password cracking attack is this vulnerable?

Social engineering

Human-hacking

Brute force

Dictionary

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cryptographic key is delivered in a digital certificate?

Digital key

Public key

Private key

Decrypt key

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?