CFP Week 6

CFP Week 6

Professional Development

•

30 Qs

quiz-placeholder

Similar activities

ELECTRICAL SYSTEM OF TRACTORS

ELECTRICAL SYSTEM OF TRACTORS

Professional Development

•

25 Qs

SOP

SOP

Professional Development

•

25 Qs

GESTION,APROVISIONAMIENTO Y COCINA

GESTION,APROVISIONAMIENTO Y COCINA

Professional Development

•

25 Qs

The Discipline of Sociology in Education

The Discipline of Sociology in Education

Professional Development

•

25 Qs

LPL NCR Sales Match 1

LPL NCR Sales Match 1

Professional Development

•

25 Qs

LG & LEGAL FOR CS

LG & LEGAL FOR CS

Professional Development

•

25 Qs

Pre-MiyerQUIZles_Nov

Pre-MiyerQUIZles_Nov

Professional Development

•

25 Qs

Cougar Quiz 2018-2019

Cougar Quiz 2018-2019

Professional Development

•

25 Qs

CFP Week 6

CFP Week 6

Assessment

Quiz

•

Professional Development

•

Professional Development

•

Practice Problem

•

Medium

Created by

Ruth Fatayo

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?

Authority

Social Proof

Intimidation
Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of Mandatory Access Control (MAC)?

Assigns permissions based on user discretion
Relies on classification levels to enforce access
Typically used in less secure environments
Allows users to change permissions at will

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack relies on identity theft?

Impersonation
Dumpster diving
Watering hole attack
Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a method of biometric access control?

Fingerprint scanner
Retina display
Voice recognition
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is used to connect multiple networks and route traffic between them?

Repeater
Bridge
Router
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is responsible for automatically assigning IP addresses to devices on a network?

DNS
DHCP
FTP
ICMP

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The term ---------------- is used to describe a practice of sifting through trash for discarded documents containing sensitive data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development