CFP Week 6

CFP Week 6

Professional Development

30 Qs

quiz-placeholder

Similar activities

Networking 2

Networking 2

Professional Development

30 Qs

Post-Test Under Cyber Closet Project

Post-Test Under Cyber Closet Project

Professional Development

25 Qs

Pre-Test under Cyber CLOSET Project

Pre-Test under Cyber CLOSET Project

Professional Development

25 Qs

CompTIA Security+ Quiz

CompTIA Security+ Quiz

Professional Development

25 Qs

Secure Use of IT

Secure Use of IT

Professional Development

26 Qs

PSE-4

PSE-4

Professional Development

27 Qs

Day 10 Quiz - Physical & Network Security

Day 10 Quiz - Physical & Network Security

Professional Development

27 Qs

Day 8 Quiz - Cloud Concepts & Wireless

Day 8 Quiz - Cloud Concepts & Wireless

Professional Development

26 Qs

CFP Week 6

CFP Week 6

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Ruth Fatayo

Used 9+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?
Authority

Social Proof

Intimidation
Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of Mandatory Access Control (MAC)?
Assigns permissions based on user discretion
Relies on classification levels to enforce access
Typically used in less secure environments
Allows users to change permissions at will

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack relies on identity theft?
Impersonation
Dumpster diving
Watering hole attack
Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a method of biometric access control?
Fingerprint scanner
Retina display
Voice recognition
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is used to connect multiple networks and route traffic between them?
Repeater
Bridge
Router
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is responsible for automatically assigning IP addresses to devices on a network?
DNS
DHCP
FTP
ICMP

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The term ---------------- is used to describe a practice of sifting through trash for discarded documents containing sensitive data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?