Search Header Logo

CyberSec Prep

Authored by herztard herztard

Philosophy

KG

Used 1+ times

CyberSec Prep
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An accountant receives a phone call from an unfamiliar individual requesting project-related information. The caller appears convincing and credible. What type of threat should the accountant be cautious about?

Social engineering

Coercion

Typosquatting

Brand impersonation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A local business's website was hacked, and customers' payment information was stolen when they placed orders on the real website. What type of attack is this?

Consensus technique

Watering hole attack

Typosquatting

Coercion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recently terminated employee copied sensitive information from the company’s shared drive right before permanently leaving. This employee is what kind of threat to the company?

External

Nation-state

Hacktivist

Internal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An assistant got an email saying the project would fail if they didn’t quickly share some information. What trick should they watch out for?

Urgency

Typosquatting

Impersonation

Pretending to be a trusted company

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer discovered that an active employee copied sensitive information from the company’s shared drive and sold it online. What kind of actor describes this employee?

Insider threat

Nation-state

Hacktivist

Advanced persistent threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A contractor found out that a client accidentally visited a fake website with a URL similar to their real one. What type of attack is it ?

Phishing

Impersonation

Watering hole attack

Typosquatting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process used to encrypt and decrypt a message?

Cryptanalysis

Plaintext

Ciphertext

Algorithm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?