Unit 4 #6

Quiz
•
Chemistry
•
12th Grade
•
Easy
Clifford Buckles
Used 4+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a phishing attack?
Loading malicious software onto a user’s computer in order to secretly gain access to sensitive information
Flooding a user’s computer with e-mail requests in order to cause the computer to crash
Gaining remote access to a user’s computer in order to steal user IDs and passwords
Using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?
Responses
After clicking the link, a browser cookie is downloaded to the recipient’s computer.
After clicking the link, a Web page opens that prompts the recipient for personal information.
After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.
After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?
Calling the bank at its official phone number to ask whether the request for personal information is legitimate
Calling the phone number given in the e-mail and providing the personal information over the phone
Checking that the domain name of the sender’s e-mail address is associated with the bank
Conducting aWeb search to see if other people have received similar requests for personal information
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
Responses
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.
A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user’s account.
A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user’s log-in information for multiple systems may be compromised.
A user receives an e-mail that claims to be from the user’s bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user’s username and password were stolen.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?
The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.
The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.
The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
Responses
A vulnerability in the device’s software is exploited to gain unauthorized access to other devices on the user’s home network.
A vulnerability in the device’s software is exploited to install software that reveals the user’s password to an unauthorized individual.
The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
The user’s account is sent an overwhelming number of messages in an attempt to disrupt service on the user’s home network.
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Mastering Chemical Equation Balancing

Quiz
•
9th Grade - University
11 questions
D.1 Pharmaceutical products & drug action

Quiz
•
12th Grade
15 questions
Lab Safety & Lab Equipment | Grade 12

Quiz
•
12th Grade
12 questions
Ionic Bonds

Quiz
•
9th - 12th Grade
12 questions
Le Chatelier's Principle QUIZ

Quiz
•
9th - 12th Grade
11 questions
Observation Vs. Inference

Quiz
•
9th - 12th Grade
10 questions
Nail Alliance Quiz

Quiz
•
12th Grade
10 questions
Unit 4 #8

Quiz
•
12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Chemistry
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
6 questions
Maier - AMDM - Unit 1 - Quiz 1 - Estimation

Quiz
•
12th Grade
21 questions
Arithmetic Sequences

Quiz
•
9th - 12th Grade
21 questions
9th Grade English Diagnostic Quiz

Quiz
•
9th - 12th Grade
7 questions
Characteristics of Life

Interactive video
•
11th Grade - University