placeholder image to represent content

OSE Theory Revision 18 - General Security

Quiz by Christian Mo Zelin

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    Which is an example of social engineering?

    an anonymous programmer directing a DDoS attack on a data center

    a computer displaying unauthorized pop-ups and adware

    an unidentified person claiming to be a technician collecting user information from employees

    the infection of a computer by a virus carried by a Trojan

    60s
  • Q2

    As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

    deletion of sensitive files

    two factor authentication

    a duplicate hard drive copy

    data encryption

    60s
  • Q3

    A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q4

    When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

    permission

    firewall

    right

    ActiveX

    60s
  • Q5

    Which two items are used in asymmetric encryption? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q6

    Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q7

    A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q8

    A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

    anonymous keylogging

    social engineering

    spam

    DDoS

    60s
  • Q9

    The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

    adware

    DDoS

    social engineering

    phishing

    spyware

    60s
  • Q10

    After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

    Talk with the user to determine the cause of the problem.

    Check for the latest OS patches and updates.

    Gather information from a number of sources to clearly identify the problem.

    Document the problem and the procedures performed to solve it.

    60s

Teachers give this quiz to your class