Chapter 2

Chapter 2

7 Qs

quiz-placeholder

Similar activities

Vocab List 18: Super, Sur

Vocab List 18: Super, Sur

6th Grade

10 Qs

GDPR

GDPR

KG - University

7 Qs

Year 1 internet safety (10 questions)

Year 1 internet safety (10 questions)

KG - University

10 Qs

Vocabulary Quiz 1 (Grade 9)

Vocabulary Quiz 1 (Grade 9)

9th Grade

12 Qs

Quiz Units 27-31

Quiz Units 27-31

6th Grade

10 Qs

Vocab List 5: Spec

Vocab List 5: Spec

6th Grade

10 Qs

Vocab List 17: Sub

Vocab List 17: Sub

6th Grade

10 Qs

Save Me A Seat Vocab Review

Save Me A Seat Vocab Review

6th Grade

10 Qs

Chapter 2

Chapter 2

Assessment

Quiz

others

Medium

Created by

Angel Martinez

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users in your organization receive email messages warning them of suspicious activity on their bank accounts. They are asked to click a link in the email to verify their online banking credentials. The URL in the link belongs to the .ru top-level DNS domain. Which kind of attack has occurred?
Phishing
Buffer overflow
Virus
Open SMTP relay

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In your capacity as a security analyst, you need to stay updated with the latest threats. You're presently analyzing the most recent real-time updates on cyberthreats globally. Which of the following resources are you MOST likely using?
Threat feeds
Intelligence fusion
Advisories and bulletins
Threat hunting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that targets senior executives and high-profile victims is referred to as what?
Whaling
Vishing
Scrubbing
Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes shoulder surfing?
Someone nearby watching you enter your password on your computer and recording it.
Guessing someone's password because it is so common or simple.
Giving someone you trust your username and account password.
Finding someone's password in the trash can and using it to access their account.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?
Fileless virus.
Worm.
Ransomware.
Remote Access Trojan (RAT).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any attack involving human interaction of some kind is referred to as what?
Social engineering
Attacker manipulation
A white hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization's receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. The individual is engaging in which type of social engineering?
Social validation
Commitment
Persuasive
Authority