Edvisor quiz3 - Encrpt & Social engg

Edvisor quiz3 - Encrpt & Social engg

Professional Development

5 Qs

quiz-placeholder

Similar activities

Dime cuánto sabes de Powtoon

Dime cuánto sabes de Powtoon

Professional Development

10 Qs

Table and Data Types - 3

Table and Data Types - 3

Professional Development

6 Qs

Module 1 Kinematic Analysis: Topic 1 Introduction to Kinovea

Module 1 Kinematic Analysis: Topic 1 Introduction to Kinovea

Professional Development

5 Qs

LG Vivendo

LG Vivendo

Professional Development

5 Qs

Risk, Issue, and CSI Logs - Knowledge Check

Risk, Issue, and CSI Logs - Knowledge Check

Professional Development

10 Qs

LESSON 1: INTRODUCTION TO OPEN EDUCATIONAL RESOURCES

LESSON 1: INTRODUCTION TO OPEN EDUCATIONAL RESOURCES

Professional Development

10 Qs

Apply Midland Training - C/M Section 4

Apply Midland Training - C/M Section 4

Professional Development

3 Qs

How well you know ND?

How well you know ND?

Professional Development

8 Qs

Edvisor quiz3 - Encrpt & Social engg

Edvisor quiz3 - Encrpt & Social engg

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

G3C Team

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an attacker calls an organization’s help desk and persuades them to reset a password for them due to the help desk employee’s trust and willingness to help, what type of attack succeeded?

A human Trojan

Social engineering

Phishing

Whaling

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption should you use on the file servers for the proprietary data, and how might you secure the data when it is in motion?

TLS at rest and AES in motion

AES at rest and TLS in motion

VPN at rest and TLS in motion

DES at rest and AES in motion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following malware types uses built-in propagation mechanisms that exploit system vulnerabilities to spread?

Trojan horse

Worm

Logic bomb

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm would provide strong protection for data stored on a USB thumb drive?

TLS

SHA1

AES

DES

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Transport Layer Security, what type of key is used to encrypt the actual content of communications between a web server and a client?

Shared session key

Client’s public key

Server’s public key

Server’s private key