Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Principles of Computer
Quiz 4: The Role of People in Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Hoaxes,while a potential nuisance,can not cause any real harm to your data.
Question 2
Multiple Choice
Which of the following is NOT an example of a poor security practice?
Question 3
Multiple Choice
An attacker watches people as they enter a building requiring a key card.He waits until he see someone who appears to be in a rush and has their hands full.He then intercepts the person,makes quick small talk,offers to help them hold what's in their hands while he swipes in,and follows behind.This is an example of
Question 4
Multiple Choice
When creating a password,users tend to use
Question 5
Multiple Choice
What are the security risks of installing games on an organization's system?
Question 6
Multiple Choice
Installing unauthorized hardware such as a communication software and modem
Question 7
Multiple Choice
What is a good first step for companies to take to fight potential social engineering attacks?
Question 8
True/False
Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.
Question 9
Multiple Choice
Attackers need a certain amount of information before launching their attack.One common place to find information is to go through the trash of the target to find information that could be useful to the attacker.This process of going through a target's trash is known in the community as
Question 10
True/False
Social engineers attempt to convince authorized individuals to provide confidential information or access to an unauthorized individual.
Question 11
Multiple Choice
All of the following are characteristics of a strong password EXCEPT:
Question 12
Multiple Choice
When an attacker attempts to get credit card numbers using telephone and voice technologies,it's called
Question 13
True/False
The only means of social engineering is through direct contact between the target and the attacker.
Question 14
Multiple Choice
Which of the following is the weakest password?
Question 15
True/False
Phishing is the most common form of social engineering attack related to computer security.
Question 16
Multiple Choice
All of the following are techniques used by a social engineer EXCEPT:
Question 17
Multiple Choice
Users on your network receive an e-mail warning them of a dangerous computer virus.It instructs the user to delete files it claims were put there by the virus,but they are actually critical system files.This is an example of