Quiz: Module 02 Pervasive Attack Surfaces and Controls

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:15 PM on 1/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

What is the attack surface of social engineering?

Human vectors

2
New cards

Bjorn just received a phone call in which the person claimed to be a senior vice president demanding that his password be reset, or else Bjorn's supervisor would be contacted about his lack of cooperation. Bjorn was convinced that this was a social engineering attack. Which principle of human manipulation did the attacker attempt on Bjorn?

Intimidation

3
New cards

Which of the following is NOT a personal technique used by social engineering attackers to gain the trust of the victim?

Demand compliance

4
New cards

Albrecht received a call from a senior vice president of finance who had received a phishing email and had deleted it. What type of phishing attack was this?

Whaling

5
New cards

Tobias received an SMS text that falsely said his bank account was overdrawn and to avoid a $45 fee, he should contact the bank immediately with an explanation. What type of social engineering attack is this?

Smishing

6
New cards

Which of the following is NOT true about BEC?

It is decreasing in popularity among threat actors.

7
New cards

Which social engineering attack is masquerading as a real or fictitious character and then playing out the role of that person on a target?

Impersonation

8
New cards

Wolfgang-Cashman is a new intern at the online company WebHighSchoolStore.com. He has been assigned the task of researching all of the similar domain names to theirs in order to counteract attacks. What is Wolfgang-Cashman combating?

Typo squatting

9
New cards

What is false or inaccurate information that comes from a malicious intent?

Disinformation

10
New cards

Which of the following is NOT a type of data reconnaissance?

Excel dorking

11
New cards

Which type of sensor is most appropriate for monitoring a large warehouse for intruders?

Microwave sensor

12
New cards

Which of the following statements is NOT true about a pressure sensor?

A pressor sensor is a type of management control.

13
New cards

Arndt is on a team that is increasing the security in an office. They want to allow anyone to pass by a door but have an alarm sound whenever someone gets too close to the door. Which sensor would Arndt recommend using?

Ultrasonic sensor

14
New cards

Which type of buffer is automated and has two interlocking doors, only one of which can be opened at a time?

Access control vestibule

15
New cards

Milan is on a design team that needs to run a hardened carrier PDS underground between two buildings. What requirement would Milan add to the specifications?

It must be encased in concrete

16
New cards

Which data classification has the highest level of data sensitivity?

Confidential

17
New cards

Jan is working on classifying data. Some data has been identified that if compromised, the function and mission of the enterprise would be severely impacted. Which data classification should Jan give this data?

Critical

18
New cards

Which type of data is hospital patient information protected by HIPAA?

Regulated data

19
New cards

JSON and XML would be classified as which type of data?

Non-human-readable data

20
New cards

Which of the following data security methods creates a copy of the original data but uses obfuscation on any sensitive elements?

Data masking