CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Interactive Video
•
Information Technology (IT), Architecture, Social Studies
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main tactic used in the phone scam scenario described in the video?
Threatening
Impersonation
Offering rewards
Bribery
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common misconception about the greatest threat to network security?
It is physical theft of devices.
It is internal employees.
It is outdated software.
It is always external hackers.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended action to prevent tailgating?
Install surveillance cameras.
Ensure no one follows you through a locked door.
Use a security badge.
Always carry a spare key.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is shoulder surfing?
Watching someone type their password over their shoulder.
Reading over someone's shoulder in a library.
Surfing the internet without a secure connection.
Using someone else's computer without permission.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a screen filter used for?
To prevent others from viewing your screen from an angle.
To enhance screen brightness.
To block harmful websites.
To reduce screen glare.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does spear phishing differ from regular phishing?
It targets a specific individual.
It uses physical mail instead of email.
It involves hacking into systems.
It is a form of social media scam.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used in phishing attacks?
Hacking into secure servers.
Sending fake emails to a large group.
Physically stealing devices.
Using malware to steal data.
Similar Resources on Wayground
2 questions
Various Password Attacks

Interactive video
•
University
6 questions
How to defend Office 365 from spear-phishing attacks

Interactive video
•
University
6 questions
Other Phishing Techniques

Interactive video
•
University
6 questions
How to Avoid Phishing Attacks

Interactive video
•
University
6 questions
PHISH: Wrapping Up and Review

Interactive video
•
KG - University
6 questions
Various Password Attacks

Interactive video
•
University
6 questions
Tips for conducting effective phishing simulations

Interactive video
•
University
6 questions
How to fight scripting attacks

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University