
CFP Week 6
Authored by Ruth Fatayo
Professional Development
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?
Social Proof
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of Mandatory Access Control (MAC)?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which social engineering attack relies on identity theft?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is NOT a method of biometric access control?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which device is used to connect multiple networks and route traffic between them?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol is responsible for automatically assigning IP addresses to devices on a network?
7.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
The term ---------------- is used to describe a practice of sifting through trash for discarded documents containing sensitive data.
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?