44. Physical Attacks

44. Physical Attacks

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason why physical access to a computer is a significant security concern?

It allows attackers to install new software.

It enables attackers to bypass the operating system.

It lets attackers change the computer's hardware.

It allows attackers to delete files.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in brute force physical attacks?

Phishing for user credentials.

Forcing open a locked door or window.

Using a password cracker.

Hacking into a Wi-Fi network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can RFID cloning be easily performed?

By using a smartphone app.

By manually copying the RFID code.

By hacking into the RFID system.

By purchasing an RFID cloner online.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential consequence of an attacker turning off the power in a data center?

The data center will become more secure.

The data center will automatically back up data.

The data center will shut down, causing a denial of service.

The data center will switch to a backup power source.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might HVAC systems be a target for attackers?

They control the network traffic.

They are often less secure than other systems.

They contain valuable data.

They store user credentials.