CFP Week 6

CFP Week 6

Professional Development

30 Qs

quiz-placeholder

Similar activities

Tool & Die Maker (Dies & Moulds) 6

Tool & Die Maker (Dies & Moulds) 6

Professional Development

25 Qs

Seleksi Digital Marketing

Seleksi Digital Marketing

Professional Development

25 Qs

Wave 31 Quiz #3

Wave 31 Quiz #3

Professional Development

25 Qs

FPL - Tata - Telephone Etiquettes

FPL - Tata - Telephone Etiquettes

Professional Development

25 Qs

PWS GCQ Night Episode 2

PWS GCQ Night Episode 2

Professional Development

25 Qs

REPASO TEMA 1 Y 2

REPASO TEMA 1 Y 2

Professional Development

25 Qs

Movilizacion

Movilizacion

Professional Development

25 Qs

LENGUA ESPAÑOLA 1

LENGUA ESPAÑOLA 1

9th Grade - Professional Development

25 Qs

CFP Week 6

CFP Week 6

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Ruth Fatayo

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?

Authority

Social Proof

Intimidation
Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of Mandatory Access Control (MAC)?

Assigns permissions based on user discretion
Relies on classification levels to enforce access
Typically used in less secure environments
Allows users to change permissions at will

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack relies on identity theft?

Impersonation
Dumpster diving
Watering hole attack
Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a method of biometric access control?

Fingerprint scanner
Retina display
Voice recognition
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is used to connect multiple networks and route traffic between them?

Repeater
Bridge
Router
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is responsible for automatically assigning IP addresses to devices on a network?

DNS
DHCP
FTP
ICMP

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The term ---------------- is used to describe a practice of sifting through trash for discarded documents containing sensitive data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?