What is the best countermeasure against social engineering?

Cybersecurity chapter 10

Quiz
•
Instructional Technology
•
8th - 12th Grade
•
Medium
Vigiland Dhaiti
Used 21+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
User awareness training
Access auditing
Strong passwords
Acceptable use policy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common form of social engineering attack?
Distributing false information about your organization's financial status.
Hoax virus information emails.
Using a sniffer to capture network traffic.
Stealing the key card of an employee and using that to enter a secured building.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark received an email from a software company claiming his account will be disabled soon. The emailcontains several spelling errors, an attachment, and states he should open the attachment for further instructions.What should Mark do?
Delete the email without opening the attachment.
Reply to the sender and ask if the attachment is safe
Open the attachment because he has anti-virus software installed.
Forward the email to a friend and ask for advice.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a Man-in-the-Middle attack?
A person over the phone convinces an employee to reveal their logon credentials
An attacker intercepts communications between two network hosts by impersonating each host
Malicious code is planted on a system where it waits for a triggering event before activating
An IP packet is constructed which is larger than the valid size.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Data redundancy
Denial-of-service
Wiretapping
Power outage
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security measures is a form of biometrics?
BIOS password
Chassis intrusion detection
Fingerprint scanner
TPM
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do biometrics use to perform authentication of identity?
Knowledge of passwords
Biological attributes
Ability to perform tasks
Possession of a device
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
Learn technical English words with me!

Quiz
•
11th Grade - University
25 questions
Chapter 18&20 Review CompTIA

Quiz
•
9th - 12th Grade
25 questions
ready Messer Questions 1-25

Quiz
•
9th Grade - University
20 questions
computer organization fundamentals

Quiz
•
9th - 10th Grade
22 questions
Cybersecurity

Quiz
•
10th - 12th Grade
20 questions
Soal Latihan US 2

Quiz
•
9th - 12th Grade
25 questions
Coding DA

Quiz
•
6th - 8th Grade
20 questions
SISTEM KOMPUTER

Quiz
•
12th Grade - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Instructional Technology
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
15 questions
Volume Prisms, Cylinders, Cones & Spheres

Quiz
•
8th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade