Search Header Logo
CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video tutorial discusses various social engineering tactics, including phishing, tailgating, shoulder surfing, and dumpster diving. It emphasizes the importance of being vigilant and protecting personal and company information. The tutorial also explains the differences between phishing and spear phishing, highlighting the need for awareness and security measures to prevent unauthorized access and data breaches.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in the phone scam scenario described in the video?

Threatening

Impersonation

Offering rewards

Bribery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common misconception about the greatest threat to network security?

It is physical theft of devices.

It is internal employees.

It is outdated software.

It is always external hackers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended action to prevent tailgating?

Install surveillance cameras.

Ensure no one follows you through a locked door.

Use a security badge.

Always carry a spare key.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is shoulder surfing?

Watching someone type their password over their shoulder.

Reading over someone's shoulder in a library.

Surfing the internet without a secure connection.

Using someone else's computer without permission.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a screen filter used for?

To prevent others from viewing your screen from an angle.

To enhance screen brightness.

To block harmful websites.

To reduce screen glare.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spear phishing differ from regular phishing?

It targets a specific individual.

It uses physical mail instead of email.

It involves hacking into systems.

It is a form of social media scam.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in phishing attacks?

Hacking into secure servers.

Sending fake emails to a large group.

Physically stealing devices.

Using malware to steal data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?