Security+ Lesson 2 Quiz

Security+ Lesson 2 Quiz

University

15 Qs

quiz-placeholder

Similar activities

Quiz 2

Quiz 2

University

16 Qs

Ironman

Ironman

1st Grade - University

12 Qs

Final Quiz

Final Quiz

University

20 Qs

Social Engineering

Social Engineering

University

15 Qs

Post-test in Online Safety, Security, Ethics and Etiquette

Post-test in Online Safety, Security, Ethics and Etiquette

University

10 Qs

Risk Management In Internal Auditor

Risk Management In Internal Auditor

University

10 Qs

Klik dengan Bijak Kuiz

Klik dengan Bijak Kuiz

KG - University

15 Qs

Campurtangan Perlindungan Awam

Campurtangan Perlindungan Awam

University

10 Qs

Security+ Lesson 2 Quiz

Security+ Lesson 2 Quiz

Assessment

Quiz

Other

University

Easy

Created by

Romano Schabalala

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a nation-state actor’s motivation?

Financial gain

Political advantage

Accidental misconfiguration

Script kiddie fame

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key characteristic of an Advanced Persistent Threat (APT)?

One-time phishing attempt

Short-term system scan

Long-term stealthy access

Random ransomware drop

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of threat actor is most likely to use default credentials and open ports?

Nation-state actor

Unintentional insider

Script kiddie

Organized crime group

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

SMiShing is a form of:

Vishing via phone calls

Messaging-based phishing via SMS

DNS redirection

Email spoofing

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a message-based attack vector?

USB malware

Drop attack

Instant Messaging (IM)

Trojan Horse

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Define attack surface and provide one example.

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain the difference between phishing and spear phishing.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?