
Question Bank
Authored by Esther Brown
Computers
9th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
268 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?
Collectors
Handlers
Filters
SIEM alerts
Answer explanation
The Log Collector is the SIEM component responsible for gathering all event logs from configured devices and securely sending them to the SIEM system.
The Log Collector is responsible for collecting logs from various sources, such as network devices, servers, applications, and databases, and then forwarding them to the SIEM system for analysis.
The Log Collector can also be configured to filter out irrelevant logs and only forward the relevant ones to the SIEM system.
2.
DROPDOWN QUESTION
30 sec • 4 pts
Keeping a switch in a room that is locked by a keypad is the best way to prevent (a) to the device.
Answer explanation
To control access to the switch console, you must keep it in a locked room. A console connection can only be established with a direct physical connection to the device. If the switch is in a locked room, only those with access will be able to make a console connection. In addition, even if you had set console passwords, users with physical access to the device could perform password recovery and gain access.
3.
DRAG AND DROP QUESTION
30 sec • 4 pts
A (a) will stop piggybacking from occurring at an entrance where employees swipe smart cards to gain entry.
Answer explanation
Piggybacking is the activity where an authorized or unauthorized individual gains entry into a secured area by exploiting the credentials of a prior person. Often, the first person will authenticate, unlock the door, and then hold it open for the next person to enter without forcing them to authenticate separately.
You can stop piggybacking with a mantrap. A mantrap is a single-person room with two doors and often includes a scale to prevent piggybacking. It requires proper authentication before unlocking the inner door to allow authorized personal into a secured area. Those who fail to properly authenticate are held captive until authorities respond.
4.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
Which of the following can be used with a mantrap to allow an easy exit but actively prevents re-entrance through the exit portal?
Turnstile
Locked door with a push bar.
Card reader
Facial recognition
Answer explanation
Turnstiles allow an easy exit from a secured environment but actively prevent re-entrance through the exit portal. Turnstiles are a common exit portal used with entrance portal mantraps. A turnstile can't be used to enter into a secured facility, as it only functions in one direction.
5.
MULTIPLE CHOICE QUESTION
30 sec • 4 pts
When a person presents themselves as a trustworthy person that plays on the victim's emotions to obtain information or access.
Masquerading
Malicious insiders
Social impersonation
Ghosting
Answer explanation
Masquerading is convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
6.
MATCH QUESTION
30 sec • 4 pts
Match the following
Piggybacking
A form of phishing that is targeted toward senior executives and high-profile victims
Phishing
An attacker entering a secure building by following an authorized employee through a secure door and not providing identification.
Dumpster diving
An email pretending to be from a trusted organization, asking the user to verify personal information or send money
Whaling
Tailgating with consent from the authorized employee
Tailgating
The process of looking in the trash for sensitive information that has not been properly disposed of.
Answer explanation
Dumpster Diving
Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.
Tailgating and Piggybacking
Piggybacking and tailgating refer to an attacker entering a secure building by following an authorized employee through a secure door and not providing identification. Piggybacking usually implies consent from the authorized employee, whereas tailgating implies no consent from the authorized employee.
Phishing
A phishing scam is an email pretending to be from a trusted organization, asking the user to verify personal information or send money. In a phishing attack:
A fraudulent message that appears to be legitimate is sent to a target.
The message requests that the target visit a fraudulent website (which also appears to be legitimate). Graphics, links, and websites look almost identical to the legitimate websites they are trying to represent.
The fraudulent website requests that the victim provide sensitive information, such as an account number and password.
Below are descriptions of common phishing scams.
A rock phish kit is a fake website that imitates a real website (such as banks, PayPal, eBay, and Amazon). Phishing emails direct you to the fake website to enter account information. A single server can host multiple fake sites using multiple registered DNS names. These sites can be set up and taken down rapidly to avoid detection.
A Nigerian scam, also known as a 419 scam, involves emails that request a small amount of money to help transfer funds from a foreign country. For your assistance, you are to receive a reward for a much larger amount of money that will be sent to you at a later date.
In spear phishing, attackers gather information about the victim, such as which online banks they use. They then send phishing emails for the specific bank. Spear phishing's goal is to gain access to information that will allow the attacker to gain commercial advantage or commit fraud. Spear phishing frequently involves sending seemingly genuine emails to all employees or members of specific teams.
Whaling is another form of phishing that is targeted toward senior executives and high-profile victims.
Vishing is similar to phishing. But instead of an email, the attacker uses Voice over IP (VoIP) to gain sensitive information. The term is a combination of voice and phishing.
7.
MULTIPLE SELECT QUESTION
30 sec • 4 pts
Which of the following is a common social engineering attack? (Pick two)
Forging employee ID cards
Tailgating through a secure door
Fake phone calls pretending to be from a financial firm
Hoax virus information emails
Answer explanation
Social engineering relies on the trusting nature of individuals to incentivize them to take an action or allow an unauthorized action.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade