
023_Impersonation – CompTIA Security+ SY0-701 – 2.2
Authored by Wayground Content
Computers
9th - 12th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if someone asks for your password over the phone?
Provide the password if they seem trustworthy
Refuse and report the call
Ask them to send an email instead
Change your password immediately
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a sign of a tech support scam?
Receiving an unsolicited call claiming your computer has issues
A friendly customer service representative from your internet provider
Receiving an email with a coupon code for antivirus software
A pop-up window from a website you trust
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you receive a suspicious call?
Immediately hang up.
Engage in conversation to gather more information.
Ask for the caller's name and number.
Report the call to your local authorities.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of impersonation scams?
Gaining the victim’s trust to steal sensitive information
To provide financial advice to victims
To sell fake products to consumers
To promote legitimate services
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you suspect someone is impersonating a company?
Call the company directly to verify the request
Ignore the request and do nothing
Respond to the request with your personal information
Report the impersonation to the police
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an organization prevent impersonation fraud?
Implement a strict dress code for employees
Educate employees on verifying requests
Limit access to company emails
Increase the number of security personnel
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is “vishing”?
Voice phishing scams over the phone
Video phishing scams via webcam
Phishing through social media platforms
Email phishing targeting voice messages
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?