Question Bank

Question Bank

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Esther Brown

Used 4+ times

FREE Resource

Student preview

quiz-placeholder

268 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?

Collectors

Handlers

Filters

SIEM alerts

Answer explanation

The Log Collector is the SIEM component responsible for gathering all event logs from configured devices and securely sending them to the SIEM system.

The Log Collector is responsible for collecting logs from various sources, such as network devices, servers, applications, and databases, and then forwarding them to the SIEM system for analysis.

The Log Collector can also be configured to filter out irrelevant logs and only forward the relevant ones to the SIEM system.

2.

DROPDOWN QUESTION

30 sec • 4 pts

Keeping a switch in a room that is locked by a keypad is the best way to prevent ​ (a)   to the device.

console access
remote access
malware infection
trojan horse access
bot access

Answer explanation

To control access to the switch console, you must keep it in a locked room. A console connection can only be established with a direct physical connection to the device. If the switch is in a locked room, only those with access will be able to make a console connection. In addition, even if you had set console passwords, users with physical access to the device could perform password recovery and gain access.

3.

DRAG AND DROP QUESTION

30 sec • 4 pts

A ​ (a)   will stop piggybacking from occurring at an entrance where employees swipe smart cards to gain entry.

mantrap
CCTV
security guard
facial recognition system

Answer explanation

Piggybacking is the activity where an authorized or unauthorized individual gains entry into a secured area by exploiting the credentials of a prior person. Often, the first person will authenticate, unlock the door, and then hold it open for the next person to enter without forcing them to authenticate separately.

You can stop piggybacking with a mantrap. A mantrap is a single-person room with two doors and often includes a scale to prevent piggybacking. It requires proper authentication before unlocking the inner door to allow authorized personal into a secured area. Those who fail to properly authenticate are held captive until authorities respond.

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Which of the following can be used with a mantrap to allow an easy exit but actively prevents re-entrance through the exit portal?

Turnstile

Locked door with a push bar.

Card reader

Facial recognition

Answer explanation

Turnstiles allow an easy exit from a secured environment but actively prevent re-entrance through the exit portal. Turnstiles are a common exit portal used with entrance portal mantraps. A turnstile can't be used to enter into a secured facility, as it only functions in one direction.

5.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

When a person presents themselves as a trustworthy person that plays on the victim's emotions to obtain information or access.

Masquerading

Malicious insiders

Social impersonation

Ghosting

Answer explanation

Masquerading is convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.

6.

MATCH QUESTION

30 sec • 4 pts

Match the following

Tailgating

Tailgating with consent from the authorized employee

Whaling

An attacker entering a secure building by following an authorized employee through a secure door and not providing identification.

Piggybacking

The process of looking in the trash for sensitive information that has not been properly disposed of.

Phishing

A form of phishing that is targeted toward senior executives and high-profile victims

Dumpster diving

An email pretending to be from a trusted organization, asking the user to verify personal information or send money

Answer explanation

Dumpster Diving

Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.

Tailgating and Piggybacking

Piggybacking and tailgating refer to an attacker entering a secure building by following an authorized employee through a secure door and not providing identification. Piggybacking usually implies consent from the authorized employee, whereas tailgating implies no consent from the authorized employee.

Phishing

A phishing scam is an email pretending to be from a trusted organization, asking the user to verify personal information or send money. In a phishing attack:

A fraudulent message that appears to be legitimate is sent to a target.

The message requests that the target visit a fraudulent website (which also appears to be legitimate). Graphics, links, and websites look almost identical to the legitimate websites they are trying to represent.

The fraudulent website requests that the victim provide sensitive information, such as an account number and password.

Below are descriptions of common phishing scams.

A rock phish kit is a fake website that imitates a real website (such as banks, PayPal, eBay, and Amazon). Phishing emails direct you to the fake website to enter account information. A single server can host multiple fake sites using multiple registered DNS names. These sites can be set up and taken down rapidly to avoid detection.

A Nigerian scam, also known as a 419 scam, involves emails that request a small amount of money to help transfer funds from a foreign country. For your assistance, you are to receive a reward for a much larger amount of money that will be sent to you at a later date.

In spear phishing, attackers gather information about the victim, such as which online banks they use. They then send phishing emails for the specific bank. Spear phishing's goal is to gain access to information that will allow the attacker to gain commercial advantage or commit fraud. Spear phishing frequently involves sending seemingly genuine emails to all employees or members of specific teams.

Whaling is another form of phishing that is targeted toward senior executives and high-profile victims.

Vishing is similar to phishing. But instead of an email, the attacker uses Voice over IP (VoIP) to gain sensitive information. The term is a combination of voice and phishing.

7.

MULTIPLE SELECT QUESTION

30 sec • 4 pts

Which of the following is a common social engineering attack? (Pick two)

Forging employee ID cards

Tailgating through a secure door

Fake phone calls pretending to be from a financial firm

Hoax virus information emails

Answer explanation

Social engineering relies on the trusting nature of individuals to incentivize them to take an action or allow an unauthorized action.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?