Check On learning¶
---
primaryColor: steelblue
shuffleQuestions: false
shuffleAnswers: true
---
### LSA 1-1: You receive a phone call stating you've won a contest, in order to redeem your prize, they need to verify your social security number. This example best demonstrates which of the following?
- [ ] Phishing
- [ ] Smishing
- [x] Pretexting
- [ ] Tailgating
### LSA 1-2 In cybersecurity, what refers to the exchange of goods, services, or favors for something of seemingly equal value between parties.
- [ ] Blackmail
- [x] Quid Pro Quo
- [ ] Whaling
- [ ] Equivalent Exchange
### LSA 2-1 Shredding any documents before throwing them in the trash helps mitigate which of the following?
- [x] Dumpster Diving
- [ ] Rubbage Rummaging
- [ ] Sewage Searching
- [ ] Garbage Grubbing
### LSA 2-2 Sometimes called "USB Dropping" this social engeneering tactic preys on the curiosity of individuals who find a USB flash drive.
- [ ] Bribery
- [ ] Whaling
- [ ] Spear Phishing
- [x] Road Apple
### LSA 3-1 This type of attack occurs when a user visits a compromised or malicious website, and malware is automatically downloaded and executed on their system.
- [ ] Worm
- [ ] Flash Virus
- [X] Drive-by Download
- [ ] Ransomware
### LSA 3-2 When implimented, what blocks access to known malicious websites or prevent users from downloading potentially harmful content.
- [ ] Enpoint Security
- [x] Web Filtering
- [ ] Patch Management
- [ ] White-listing
### LSA 4-1 ***(TRUE of FALSE)*** Employee training is one of the most effective ways to mitigate social engineering attempts.
- [x] True
- [ ] False