
OSE Theory Revision 18 - General Security
Quiz by Christian Mo Zelin
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which is an example of social engineering?
an anonymous programmer directing a DDoS attack on a data center
a computer displaying unauthorized pop-ups and adware
an unidentified person claiming to be a technician collecting user information from employees
the infection of a computer by a virus carried by a Trojan
60s - Q2
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
deletion of sensitive files
two factor authentication
a duplicate hard drive copy
data encryption
60s - Q3
A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)
Users sort answers between categoriesSorting60s - Q4
When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?
permission
firewall
right
ActiveX
60s - Q5
Which two items are used in asymmetric encryption? (Choose two.)
Users sort answers between categoriesSorting60s - Q6
Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
Users sort answers between categoriesSorting60s - Q7
A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)
Users sort answers between categoriesSorting60s - Q8
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
anonymous keylogging
social engineering
spam
DDoS
60s - Q9
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
adware
DDoS
social engineering
phishing
spyware
60s - Q10
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
Talk with the user to determine the cause of the problem.
Check for the latest OS patches and updates.
Gather information from a number of sources to clearly identify the problem.
Document the problem and the procedures performed to solve it.
60s