
IAS-ME-IT3102
Authored by Ardi Moran
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker bullies a target into taking an action by threatening job loss. Which principle is primarily being used? (1 pt)
Familiarity
Intimidation
Trust
Scarcity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle relies on a target liking the individual or organization the attacker claims to represent? (1 pt)
Familiarity
Authority
Consensus
Intimidation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Creating a feeling that an action must be taken quickly due to some reason is an example of which principle? (1 pt)
Familiarity
Consensus
Urgency
Authority
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Smishing primarily attempts to get users to do what? (1 pt)
Answer a phone survey
Download an email attachment
Join a video conference
Click a link in a text message
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing most often occurs through which medium, according to the material? (1 pt)
In-person meetings
Phone calls
Postal mail
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vishing primarily uses which communication channel? (1 pt)
Email messages
Social media content
Voicemail messages
Face-to-face meetings
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which scan type is most appropriate for mission-critical systems exposed to the internet? (1 pt)
Monthly scans
Continuous scans
Annual scans
Adhoc scans only
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?