
1002 A + Ch 04 & 05 Security Principles & Security Technologies
Authored by Brandon Dewater
Instructional Technology, Computers
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?
Social engineering
Ransomware
Man-in-the-middle
Shoulder surfing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of security threat where a collection of infected computers is used together to deliver spam, spread malware, or other attacks?
Phishing
Botnet
Logic bomb
Man-in-the-middle
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?
Trojan horse
Spyware
Social engineering
Worms
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment is ________.
Social engineering
Spoofing
Zero-day
Man-in-the-middle
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user in the accounting department is not able to access a file on the network accounting folder. What is the likely reason?
The workstation is victim of a denial-of-service attack
The username is not authenticating on the network
The user does not have file level permissions
The administrator has not applied appropriate security patches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
VPN
ACL
RDP
DLP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of setting practices and procedures that govern how an organization will respond to a data security breach?
Incident Management
Disaster Recovery Plan
Business Impact Analysis
Group Security Policy Settings
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
City and Guilds Award in Mobile and Operating System
Quiz
•
12th Grade - Professi...
35 questions
Computer Parts and Accessories
Quiz
•
7th Grade - Professio...
28 questions
Google Certified Educator Exam Level 1
Quiz
•
Professional Development
30 questions
1-30 Quiz
Quiz
•
Professional Development
30 questions
Part II- Practice Study Guide (ITF+)
Quiz
•
Professional Development
30 questions
C BASICS
Quiz
•
Professional Development
28 questions
CISCO M1 - Networking Today (Module 1)
Quiz
•
Professional Development
30 questions
Đề tham khảo Tin học - 1
Quiz
•
Professional Development
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Instructional Technology
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L5_22-23
Lesson
•
KG - Professional Dev...
10 questions
March Quiz
Quiz
•
Professional Development
5 questions
Copy of G5_U6_L8_22-23
Lesson
•
KG - Professional Dev...
10 questions
suffixes FUL OR LESS
Quiz
•
Professional Development