Quiz #2 Mitigating Security Threats for Organizational Assets

Quiz #2 Mitigating Security Threats for Organizational Assets

University

26 Qs

quiz-placeholder

Similar activities

IT 638 Midterm Examination

IT 638 Midterm Examination

University

30 Qs

Networking Quiz 2

Networking Quiz 2

University

30 Qs

Exploring Footprinting and Reconnaissance

Exploring Footprinting and Reconnaissance

University

23 Qs

Q1_Web Systems

Q1_Web Systems

University

21 Qs

ITEC 100 QUIZ 4 IHJasw

ITEC 100 QUIZ 4 IHJasw

University

30 Qs

BBI Internal Practice Quiz

BBI Internal Practice Quiz

University

26 Qs

Quiz Lesson 4-6

Quiz Lesson 4-6

University

25 Qs

Cybersecurity Concepts Quiz

Cybersecurity Concepts Quiz

University

24 Qs

Quiz #2 Mitigating Security Threats for Organizational Assets

Quiz #2 Mitigating Security Threats for Organizational Assets

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

June Mercene

Used 4+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An individual successfully breaks into SecureTech’s financial database to steal client records. This person is considered a:

Cracker

Black Hat Hacker

Grey Hat Hacker

White Hat Hacker

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An unusual increase in network traffic at SecureTech needs investigation. Which tool is best suited for this task?

Vulnerability Scanning Tools

Firewall

Protocol Analyzer

Port Scanner

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Attackers overwhelm a company’s servers with repeated requests, making them unavailable to legitimate users. This scenario best describes a:

IP Spoofing

Spam Flood

DoS Attack

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A are false warnings or fake information spread online to trick people into believing something that isn’t true.

Hoaxes

Adware

Phishing

Social Engineering

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A program that captures a user’s input without their knowledge and transmits it to a third party.

Rootkit

Keylogger

Backdoor

Spyware

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Employees receive a message claiming to be from their company’s IT support, asking for login credentials.

Spear Phising

Pharming

Phreaking

Social Engineering

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts messages between a user and a server, altering the communication without detection.

Replay Attack

Hijacking

Man-in-the-Middle-Attack

Spoofing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?