New Activity
Play Froggy Jumps
1. What is the best countermeasure against social engineering?
A
User awareness training
B
Acceptable use policy
C
Access auditing
2. Which of the following is a common form of social engineering attack?
A
Distributing false information about your organization's financial status.
B
Hoax virus information emails
C
Using a sniffer to capture network traffic.
3. Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
A
Delete the email without opening the attachment.
B
Open the attachment because he has anti-virus software installed.
C
Forward the email to a friend and ask for advice.
4. Which of the following describes a Man-in-the-Middle attack?
A
A person over the phone convinces an employee to reveal their logon credentials.
B
An IP packet is constructed which is larger than the valid size.
C
An attacker intercepts communications between two network hosts by impersonating each host.
5. A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
A
Power outage
B
Denial-of-service
C
Data redundancy
6. A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.
A
Zombie/botnet
B
Spoofing
C
Phishing
7. You receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. Which of the following is the next BEST step to perform?
A
Contain the problem.
B
Hire a forensic team to gather evidence.
C
Investigate how the attack occurred.
8. Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?
A
Lock the screen with some form of authentication
B
Avoid anti-virus apps
C
Turn off location services
9. In which of the following situations should you expect total privacy?
A
Instant messaging
B
Social networking
C
Financial transactions
10. In which of the following should you expect some privacy?
A
Emailing an important document to a friend using an employer email system
B
Metadata stored by a web browser
C
Personally identifiable information entered into a human resource database