
Unit 4 #6
Authored by Clifford Buckles
Chemistry
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a phishing attack?
Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information
Flooding a user’s computer with e-mail requests in order to cause the computer to crash
Gaining remote access to a user’s computer in order to steal user IDs and passwords
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?
Responses
After clicking the link, a browser cookie is downloaded to the recipient’s computer.
After clicking the link, a Web page opens that prompts the recipient for personal information.
After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.
After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?
Calling the bank at its official phone number to ask whether the request for personal information is legitimate
Calling the phone number given in the e-mail and providing the personal information over the phone
Checking that the domain name of the sender’s e-mail address is associated with the bank
Conducting aWeb search to see if other people have received similar requests for personal information
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
Responses
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.
A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user’s account.
A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user’s log-in information for multiple systems may be compromised.
A user receives an e-mail that claims to be from the user’s bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user’s username and password were stolen.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?
The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.
The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.
The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
Responses
A vulnerability in the device’s software is exploited to gain unauthorized access to other devices on the user’s home network.
A vulnerability in the device’s software is exploited to install software that reveals the user’s password to an unauthorized individual.
The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
The user’s account is sent an overwhelming number of messages in an attempt to disrupt service on the user’s home network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Pollution
Quiz
•
12th Grade - University
10 questions
Reactions of ions in aqueous solution basics
Quiz
•
12th Grade - University
10 questions
Anime
Quiz
•
KG - University
15 questions
Intro to Stoichiometry
Quiz
•
10th - 12th Grade
10 questions
Estado Físico da matéria
Quiz
•
6th - 12th Grade
10 questions
OCR C2 Chemistry
Quiz
•
KG - University
10 questions
FREE ENERGY
Quiz
•
10th Grade - University
11 questions
PAPA 321.3: Volumetric Analysis
Quiz
•
12th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Chemistry
20 questions
Types of Chemical Reactions
Quiz
•
9th - 12th Grade
20 questions
electron configurations and orbital notation
Quiz
•
9th - 12th Grade
14 questions
Reaction Types, Balancing, and Predicting Products
Quiz
•
9th - 12th Grade
8 questions
Empirical and Molecular Formulas
Lesson
•
9th - 12th Grade
4 questions
Stoichiometry Lesson
Lesson
•
9th - 12th Grade