Mentoring Security Chapter 4

Mentoring Security Chapter 4

1st - 5th Grade

5 Qs

quiz-placeholder

Similar activities

Safe Physical Training through Covid 19

Safe Physical Training through Covid 19

1st - 12th Grade

10 Qs

Aula 1 - LÓGICA DE PROGRAMAÇÃO

Aula 1 - LÓGICA DE PROGRAMAÇÃO

1st Grade

10 Qs

RGPD quizz

RGPD quizz

KG - Professional Development

10 Qs

Taller de lenguaje

Taller de lenguaje

1st Grade

10 Qs

sexualidad etapa preescolar

sexualidad etapa preescolar

3rd Grade

10 Qs

Emprendimiento

Emprendimiento

1st - 12th Grade

10 Qs

ESTRATEGIAS DE NEGOCIACION

ESTRATEGIAS DE NEGOCIACION

1st Grade

10 Qs

Lectura

Lectura

1st Grade

10 Qs

Mentoring Security Chapter 4

Mentoring Security Chapter 4

Assessment

Quiz

Professional Development

1st - 5th Grade

Hard

Created by

Didik Suryabuana

Used 3+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. An employee calls IT personnel and states that they received an email with a PDF document to review. After the PDF was opened, the system has not been performing correctly. An IT admin conducted a scan and found a virus. Determine the two classes of viruses the computer most likely has. (Select all that apply.)

Macro

Program

Script

Boot sector

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following depict ways a malicious attacker can gain access to a target's network? (Select all that apply.)

Shoulder surfing

Mantrap

Ethical hacking

Phishing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

3. A tech concludes that a user's PC is infected with a virus that appears to be a memory resident and loads anytime the operating system is restarted. Examine the options and determine which describes the infection type

Monitors local application activity

Uses a local scripting engine

Written to the partition table of a fixed disk

Replicates over network resources

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which situation would require keyboard encryption software be installed on a computer?

To protect against spyware

To set up single sign-on privileges

To comply with input validation practices

For the purpose of key management

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A gaming company decides to add software on each title it releases. The company's objective is to require the CD to be inserted during use. This software will gain administrative rights, change system files, and hide from detection without the knowledge or consent of the user. Consider the malware characteristics and determine which is being used.

Rootkit

Trojan

Spyware

Keylogger