Security+ Lesson 2 Quiz

Security+ Lesson 2 Quiz

University

15 Qs

quiz-placeholder

Similar activities

Resolviendo pruebas de Admisión 1RL 20-12-2024

Resolviendo pruebas de Admisión 1RL 20-12-2024

University

15 Qs

Quiz PLD 1

Quiz PLD 1

University

10 Qs

2-62_Chap6 Virus Computer Crime

2-62_Chap6 Virus Computer Crime

University

15 Qs

Introduction to Chemical Process Safety

Introduction to Chemical Process Safety

University

10 Qs

Disney all time Triva

Disney all time Triva

KG - Professional Development

20 Qs

Fundamental and Technical Analysis

Fundamental and Technical Analysis

University

19 Qs

Los Vengadores (Avengers) CCAV

Los Vengadores (Avengers) CCAV

3rd Grade - University

10 Qs

Technopreneurship & Inovasi 119

Technopreneurship & Inovasi 119

University

20 Qs

Security+ Lesson 2 Quiz

Security+ Lesson 2 Quiz

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

Romano Schabalala

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a nation-state actor’s motivation?

Financial gain

Political advantage

Accidental misconfiguration

Script kiddie fame

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key characteristic of an Advanced Persistent Threat (APT)?

One-time phishing attempt

Short-term system scan

Long-term stealthy access

Random ransomware drop

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of threat actor is most likely to use default credentials and open ports?

Nation-state actor

Unintentional insider

Script kiddie

Organized crime group

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

SMiShing is a form of:

Vishing via phone calls

Messaging-based phishing via SMS

DNS redirection

Email spoofing

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a message-based attack vector?

USB malware

Drop attack

Instant Messaging (IM)

Trojan Horse

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Define attack surface and provide one example.

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain the difference between phishing and spear phishing.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?