
0478 5.3 Brute Force and Social Engineering
Authored by Robert Morrison
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Downloading a list of common passwords and looping through them, trying to log in with each one, is an example of...
Brute force attack
Social engineering
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are in a restaurant at lunchtime with your colleagues wearing work uniform. Somebody approaches you and is very friendly, asking casual questions about your company. They may be trying to perform a...
Brute force attack
Social engineering attack
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Increasing the complexity (length, character variety) of a password will help prevent against...
Brute Force attacks
Social Engineering attacks
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which solutions are particularly effective at preventing brute force attacks?
Time outs
Training staff not to share private information
Proxy servers
Complex passwords
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To prevent against brute force, we can have a system where a user is only allowed a few failed logins before they are locked out for a period of time. This is called...
DDOS
Time outs
Social Engineering
Lockdown
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?