CFP Week 6

CFP Week 6

Professional Development

30 Qs

quiz-placeholder

Similar activities

Salesforce Admin & Development  Final Assessment

Salesforce Admin & Development Final Assessment

Professional Development

25 Qs

Pre-Test under Cyber CLOSET Project

Pre-Test under Cyber CLOSET Project

Professional Development

25 Qs

MICROSOFT to ACER AND ASUS VIVOBOOK SUPREME

MICROSOFT to ACER AND ASUS VIVOBOOK SUPREME

Professional Development

35 Qs

Digital Library Final Test

Digital Library Final Test

Professional Development

35 Qs

I.T.LITERACY M3

I.T.LITERACY M3

Professional Development

25 Qs

TEACHING  PRINCIPLES

TEACHING PRINCIPLES

Professional Development

30 Qs

Networks 1

Networks 1

Professional Development

30 Qs

INDIHOME 3P JULI 2018

INDIHOME 3P JULI 2018

University - Professional Development

30 Qs

CFP Week 6

CFP Week 6

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Ruth Fatayo

Used 9+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?
Authority

Social Proof

Intimidation
Urgency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of Mandatory Access Control (MAC)?
Assigns permissions based on user discretion
Relies on classification levels to enforce access
Typically used in less secure environments
Allows users to change permissions at will

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack relies on identity theft?
Impersonation
Dumpster diving
Watering hole attack
Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a method of biometric access control?
Fingerprint scanner
Retina display
Voice recognition
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is used to connect multiple networks and route traffic between them?
Repeater
Bridge
Router
Switch

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is responsible for automatically assigning IP addresses to devices on a network?
DNS
DHCP
FTP
ICMP

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The term ---------------- is used to describe a practice of sifting through trash for discarded documents containing sensitive data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?