Search Header Logo

0478 5.3 Brute Force and Social Engineering

Authored by Robert Morrison

Computers

10th Grade

0478 5.3 Brute Force and Social Engineering
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Downloading a list of common passwords and looping through them, trying to log in with each one, is an example of...

Brute force attack

Social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are in a restaurant at lunchtime with your colleagues wearing work uniform. Somebody approaches you and is very friendly, asking casual questions about your company. They may be trying to perform a...

Brute force attack

Social engineering attack

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Increasing the complexity (length, character variety) of a password will help prevent against...

Brute Force attacks

Social Engineering attacks

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which solutions are particularly effective at preventing brute force attacks?

Time outs

Training staff not to share private information

Proxy servers

Complex passwords

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To prevent against brute force, we can have a system where a user is only allowed a few failed logins before they are locked out for a period of time. This is called...

DDOS

Time outs

Social Engineering

Lockdown

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?