CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial discusses various social engineering tactics, including phishing, tailgating, shoulder surfing, and dumpster diving. It emphasizes the importance of being vigilant and protecting personal and company information. The tutorial also explains the differences between phishing and spear phishing, highlighting the need for awareness and security measures to prevent unauthorized access and data breaches.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main tactic used in the phone scam scenario described in the video?

Threatening

Impersonation

Offering rewards

Bribery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common misconception about the greatest threat to network security?

It is physical theft of devices.

It is internal employees.

It is outdated software.

It is always external hackers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended action to prevent tailgating?

Install surveillance cameras.

Ensure no one follows you through a locked door.

Use a security badge.

Always carry a spare key.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is shoulder surfing?

Watching someone type their password over their shoulder.

Reading over someone's shoulder in a library.

Surfing the internet without a secure connection.

Using someone else's computer without permission.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a screen filter used for?

To prevent others from viewing your screen from an angle.

To enhance screen brightness.

To block harmful websites.

To reduce screen glare.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spear phishing differ from regular phishing?

It targets a specific individual.

It uses physical mail instead of email.

It involves hacking into systems.

It is a form of social media scam.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in phishing attacks?

Hacking into secure servers.

Sending fake emails to a large group.

Physically stealing devices.

Using malware to steal data.